Sciweavers

435 search results - page 33 / 87
» The Design, Implementation, and Use of the Ngram Statistics ...
Sort
View
APWEB
2008
Springer
13 years 10 months ago
A Method for Web Information Extraction
The Word Wide Web has becoming one of the most important information repositories. However, information in web pages is free of standards in presentation, without being organized i...
Man I. Lam, Zhiguo Gong, Maybin K. Muyeba
NDSS
2000
IEEE
14 years 9 days ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
BIRTHDAY
2007
Springer
13 years 12 months ago
Deriving Specifications for Systems That Are Connected to the Physical World
Well understood methods exist for developing programs from formal specifications. Not only do such methods offer a precise check that certain sorts of deviations from their specifi...
Cliff B. Jones, Ian J. Hayes, Michael A. Jackson
CORR
2007
Springer
202views Education» more  CORR 2007»
13 years 8 months ago
Designing a Virtual Manikin Animation Framework Aimed at Virtual Prototyping
: In the industry, numerous commercial packages provide tools to introduce, and analyse human behaviour in the product's environment (for maintenance, ergonomics...), thanks t...
Antoine Rennuit, Alain Micaelli, Claude Andriot, F...
ECTEL
2007
Springer
14 years 2 months ago
The Everlasting Dawn of Educational Brokers - A Search for Key Design Principles
In the last couple of years we have evidenced several initiatives promoting the vision of open educational systems. Educational brokers are supposed to take advantage of this ‘in...
Bernd Simon, Petra Oberhumer, Robert Kristöfl