Sciweavers

118 search results - page 8 / 24
» Graph Technology in Reverse Engineering: The TGraph Approach
Sort
View
KBSE
2006
IEEE
14 years 1 months ago
A Portable Compiler-Integrated Approach to Permanent Checking
Program checking technology is now a mature technology, but is not yet used on a large scale. We identify one cause of this gap in the decoupling of checking tools from the everyd...
Eugen-Nicolae Volanschi
CCS
2007
ACM
14 years 1 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
CIKM
2010
Springer
13 years 6 months ago
Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval
We explore the application of a graph representation to model similarity relationships that exist among images found on the Web. The resulting similarity-induced graph allows us t...
Barbara Poblete, Benjamin Bustos, Marcelo Mendoza,...
CLUSTER
2002
IEEE
14 years 18 days ago
Leveraging Standard Core Technologies to Programmatically Build Linux Cluster Appliances
Clusters have made the jump from lab prototypes to fullfledged production computing platforms. The number, variety, and specialized configurations of these machines are increasi...
Mason J. Katz, Philip M. Papadopoulos, Greg Bruno
CIKM
2010
Springer
13 years 6 months ago
A structured approach to query recommendation with social annotation data
Query recommendation has been recognized as an important mean to help users search and also improve the usability of search engines. Existing approaches mainly focus on helping us...
Jiafeng Guo, Xueqi Cheng, Gu Xu, Huawei Shen