Sciweavers

1533 search results - page 213 / 307
» Semantic Matching: Algorithms and Implementation
Sort
View
POPL
2002
ACM
14 years 10 months ago
Adaptive functional programming
An adaptive computation maintains the relationship between its input and output as the input changes. Although various techniques for adaptive computing have been proposed, they r...
Umut A. Acar, Guy E. Blelloch, Robert Harper
OSDI
2002
ACM
14 years 10 months ago
Taming Aggressive Replication in the Pangaea Wide-Area File System
Pangaea is a wide-area file system that supports data sharing among a community of widely distributed users. It is built on a symmetrically decentralized infrastructure that consi...
Yasushi Saito, Christos T. Karamanolis, Magnus Kar...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
PKDD
2009
Springer
94views Data Mining» more  PKDD 2009»
14 years 4 months ago
OTTHO: On the Tip of My THOught
In this paper we propose a system to solve a language game, called Guillotine, which requires a player with a strong cultural and linguistic background knowledge. The player obser...
Pierpaolo Basile, Marco Degemmis, Pasquale Lops, G...
ADBIS
2008
Springer
131views Database» more  ADBIS 2008»
14 years 4 months ago
Increasing Expressiveness of Composite Events Using Parameter Contexts
The event-condition-action paradigm (also known as triggers or ECA rules) gives a database “active” capabilities – the ability to react automatically to changes in the databa...
Indrakshi Ray, Wei Huang