Sciweavers

1005 search results - page 27 / 201
» Information systems security engineering: a critical compone...
Sort
View
SIGMOD
2011
ACM
218views Database» more  SIGMOD 2011»
12 years 11 months ago
A data-oriented transaction execution engine and supporting tools
Conventional OLTP systems assign each transaction to a worker thread and that thread accesses data, depending on what the transaction dictates. This thread-to-transaction work ass...
Ippokratis Pandis, Pinar Tözün, Miguel B...
JCDL
2006
ACM
101views Education» more  JCDL 2006»
14 years 2 months ago
Search engine driven author disambiguation
In scholarly digital libraries, author disambiguation is an important task that attributes a scholarly work with specific authors. This is critical when individuals share the sam...
Yee Fan Tan, Min-Yen Kan, Dongwon Lee
NAACL
2001
13 years 10 months ago
Re-Engineering Letter-to-Sound Rules
Using finite-state automata for the text analysis component in a text-to-speech system is problematic in several respects: the rewrite rules from which the automata are compiled a...
Martin Jansche
INFSOF
2006
102views more  INFSOF 2006»
13 years 8 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
WISA
2005
Springer
14 years 2 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...