Sciweavers

1902 search results - page 309 / 381
» Information Integration Architecture Development: A Multi-Ag...
Sort
View
CF
2004
ACM
15 years 9 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
SIGMOD
2007
ACM
160views Database» more  SIGMOD 2007»
16 years 4 months ago
Supporting ranking and clustering as generalized order-by and group-by
The Boolean semantics of SQL queries cannot adequately capture the "fuzzy" preferences and "soft" criteria required in non-traditional data retrieval applicati...
Chengkai Li, Min Wang, Lipyeow Lim, Haixun Wang, K...
TCBB
2008
137views more  TCBB 2008»
15 years 3 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...

Publication
107views
16 years 1 months ago
RATC: A Robust Automated Tag Clustering Technique
Abstract. Nowadays, the most dominant and noteworthy web information sources are developed according to the collaborative-web paradigm, also known as Web 2.0. In particular, it rep...
Ludovico Boratto, Salvatore Carta, Eloisa Vargiu
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
15 years 7 months ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...