Sciweavers

85 search results - page 17 / 17
» Some Common Pitfalls in the Design of Ontology-driven Inform...
Sort
View
ICDAR
2003
IEEE
14 years 21 days ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst
BMCBI
2006
205views more  BMCBI 2006»
13 years 7 months ago
Application of Petri net based analysis techniques to signal transduction pathways
Background: Signal transduction pathways are usually modelled using classical quantitative methods, which are based on ordinary differential equations (ODEs). However, some diffic...
Andrea Sackmann, Monika Heiner, Ina Koch
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
CHI
2010
ACM
14 years 2 months ago
Signed networks in social media
Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on soci...
Jure Leskovec, Daniel P. Huttenlocher, Jon M. Klei...
CSCW
2011
ACM
12 years 11 months ago
Real-time groupware in the browser: testing the performance of web-based networking
Standard web browsers are becoming a common platform for delivering groupware applications, but until recently, the only way to support real-time collaboration was with browser pl...
Carl A. Gutwin, Michael Lippold, T. C. Nicholas Gr...