Sciweavers

4841 search results - page 770 / 969
» On dynamic feature location
Sort
View
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ISBI
2008
IEEE
14 years 9 months ago
Axonal bouton modeling, detection and distribution analysis for the study of neural circuit organization and plasticity
We propose a novel method for axonal bouton modeling and automated detection in populations of labeled neurons, as well as bouton distribution analysis for the study of neural cir...
Abhay Mavalankar, Amina Chebira, Christina A. Hall...
WWW
2008
ACM
14 years 9 months ago
A differential notion of place for local search
For extracting the characteristics a specific geographic entity, and notably a place, we propose to use dynamic Extreme Tagging Systems in combination with the classic approach of...
Vlad Tanasescu, John Domingue
WWW
2004
ACM
14 years 9 months ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger
WWW
2002
ACM
14 years 9 months ago
Clustering for opportunistic communication
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...