Sciweavers

1178 search results - page 197 / 236
» Static and Dynamic Evaluation of Data Dependence Analysis
Sort
View
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
KDD
1997
ACM
96views Data Mining» more  KDD 1997»
14 years 28 days ago
Using General Impressions to Analyze Discovered Classification Rules
One of the important problems in data mining is the evaluation of subjective interestingness of the discovered rules. Past research has found that in many real-life applications i...
Bing Liu, Wynne Hsu, Shu Chen
SIGKDD
2008
125views more  SIGKDD 2008»
13 years 8 months ago
Incremental pattern discovery on streams, graphs and tensors
Incremental pattern discovery targets streaming applications where the data continuously arrive incrementally. The questions are how to find patterns (main trends) incrementally; ...
Jimeng Sun
GIS
2009
ACM
14 years 3 months ago
Constrained reverse nearest neighbor search on mobile objects
In this paper, we formalize the novel concept of Constrained Reverse k-Nearest Neighbor (CRkNN) search on mobile objects (clients) performed at a central server. The CRkNN query c...
Tobias Emrich, Hans-Peter Kriegel, Peer Kröge...
CF
2009
ACM
14 years 3 months ago
Space-and-time efficient garbage collectors for parallel systems
As multithreaded server applications and runtime systems prevail, garbage collection is becoming an essential feature to support high performance systems. The fundamental issue of...
Shaoshan Liu, Ligang Wang, Xiao-Feng Li, Jean-Luc ...