Sciweavers

1147 search results - page 104 / 230
» Engineering the Presentation Layer for Semantic Web Informat...
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 2 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
IUI
2000
ACM
14 years 8 days ago
User interactions with everyday applications as context for just-in-time information access
Our central claim is that user interactions with everyday productivity applications (e.g., word processors, Web browsers, etc.) provide rich contextual information that can be lev...
Jay Budzik, Kristian J. Hammond
ICWE
2004
Springer
14 years 1 months ago
Semantic Lookup in Service-Oriented Architectures
Lookup of services is an important issues in many distributed systems. This paper deals with lookup in service-oriented architectures, such as Web services, P2P systems, GRIDs, or ...
Uwe Zdun
LAWEB
2003
IEEE
14 years 1 months ago
Estimating the Development Effort of Web Projects in Chile
This article presents a method to fast estimate the development effort of Web-based information systems in Chile. The method, called Chilean Web Application Development Effort Est...
Sergio F. Ochoa, M. Cecilia Bastarrica, Germ&aacut...
LREC
2008
125views Education» more  LREC 2008»
13 years 9 months ago
Similar Term Discovery using Web Search
We present an approach to the discovery of semantically similar terms that utilizes a web search engine as both a source for generating related terms and a tool for estimating the...
Peter G. Anick, Vijay Murthi, Shaji Sebastian