Sciweavers

379 search results - page 72 / 76
» Generalized Typestate Checking for Data Structure Consistenc...
Sort
View
ELPUB
1998
ACM
13 years 12 months ago
Addressing Publishing Issues with Hypermedia Distributed on the Web
The content and structure of an electronically published document can be authored and processed in ways that allow for flexibility in presentation on different environments for di...
Lloyd Rutledge, Lynda Hardman, Jacco van Ossenbrug...
DIMVA
2008
13 years 9 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
BMCBI
2008
87views more  BMCBI 2008»
13 years 7 months ago
Volume-based solvation models out-perform area-based models in combined studies of wild-type and mutated protein-protein interfa
Background: Empirical binding models have previously been investigated for the energetics of protein complexation (G models) and for the influence of mutations on complexation (i....
Salim Bougouffa, Jim Warwicker
WWW
2009
ACM
14 years 8 months ago
Evaluating similarity measures for emergent semantics of social tagging
Social bookmarking systems and their emergent information structures, known as folksonomies, are increasingly important data sources for Semantic Web applications. A key question ...
Benjamin Markines, Ciro Cattuto, Filippo Menczer, ...
WWW
2003
ACM
14 years 8 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...