Sciweavers

2880 search results - page 567 / 576
» Types are calling conventions
Sort
View
173
Voted
PVLDB
2010
125views more  PVLDB 2010»
15 years 1 months ago
MapMerge: Correlating Independent Schema Mappings
One of the main steps towards integration or exchange of data is to design the mappings that describe the (often complex) relationships between the source schemas or formats and t...
Bogdan Alexe, Mauricio A. Hernández, Lucian...
140
Voted
RAID
2010
Springer
15 years 1 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
121
Voted
RAS
2010
136views more  RAS 2010»
15 years 1 months ago
A realistic benchmark for visual indoor place recognition
An important competence for a mobile robot system is the ability to localize and perform context interpretation. This is required to perform basic navigation and to facilitate loc...
Andrzej Pronobis, Barbara Caputo, Patric Jensfelt,...
156
Voted
SIGMOD
2010
ACM
308views Database» more  SIGMOD 2010»
15 years 1 months ago
GBLENDER: towards blending visual query formulation and query processing in graph databases
Given a graph database D and a query graph g, an exact subgraph matching query asks for the set S of graphs in D that contain g as a subgraph. This type of queries find important...
Changjiu Jin, Sourav S. Bhowmick, Xiaokui Xiao, Ja...
132
Voted
TDSC
2010
191views more  TDSC 2010»
15 years 1 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu