Sciweavers

950 search results - page 116 / 190
» Evaluation over thousands of queries
Sort
View
ASPLOS
2004
ACM
14 years 3 months ago
Scalable selective re-execution for EDGE architectures
Pipeline flushes are becoming increasingly expensive in modern microprocessors with large instruction windows and deep pipelines. Selective re-execution is a technique that can r...
Rajagopalan Desikan, Simha Sethumadhavan, Doug Bur...
PVLDB
2008
117views more  PVLDB 2008»
13 years 9 months ago
Learning to extract form labels
In this paper we describe a new approach to extract element labels from Web form interfaces. Having these labels is a requirement for several techniques that attempt to retrieve a...
Hoa Nguyen, Thanh Hoang Nguyen, Juliana Freire
JCDL
2011
ACM
226views Education» more  JCDL 2011»
13 years 1 months ago
Measuring historical word sense variation
We describe here a method for automatically identifying word sense variation in a dated collection of historical books in a large digital library. By leveraging a small set of kno...
David Bamman, Gregory Crane
PERVASIVE
2005
Springer
14 years 3 months ago
Towards Massively Multi-user Augmented Reality on Handheld Devices
Augmented Reality (AR) can naturally complement mobile computing on wearable devices by providing an intuitive interface to a three-dimensional information space embedded within ph...
Daniel Wagner, Thomas Pintaric, Florian Ledermann,...
DIMVA
2009
13 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...