Sciweavers

614 search results - page 119 / 123
» Information Integrity Technology Product Structure
Sort
View
WWW
2006
ACM
14 years 10 months ago
Optimizing scoring functions and indexes for proximity search in type-annotated corpora
We introduce a new, powerful class of text proximity queries: find an instance of a given "answer type" (person, place, distance) near "selector" tokens matchi...
Soumen Chakrabarti, Kriti Puniyani, Sujatha Das
CIKM
2000
Springer
14 years 2 months ago
Extending OLAP Querying to External Object Databases
On-Line Analytical Processing (OLAP) systems based on a multidimensional view of data have found widespread use in business applications and are being used increasingly in non-sta...
Torben Bach Pedersen, Arie Shoshani, Junmin Gu, Ch...
ECOWS
2009
Springer
14 years 1 months ago
Service-Based Semantic Search in P2P Systems
—Recently, Semantic Web Services have been increasingly adopted to search, access and manipulate information made available from autonomous and heterogeneous systems interacting ...
Devis Bianchini, Valeria De Antonellis, Michele Me...
ICISS
2010
Springer
13 years 7 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
PERCOM
2009
ACM
14 years 10 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi