Sciweavers

10899 search results - page 2025 / 2180
» Wide Area Computation
Sort
View
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
WWW
2009
ACM
16 years 5 months ago
Seller's credibility in electronic markets: a complex network based approach
In the last decade, there has been an explosion of online commercial activity enabled by the World Wide Web. An electronic marketplace (e-market) provides an online method to perf...
Adriano M. Pereira, Arlei Silva, Wagner Meira Jr.,...
WWW
2009
ACM
16 years 5 months ago
Analyzing seller practices in a Brazilian marketplace
E-commerce is growing at an exponential rate. In the last decade, there has been an explosion of online commercial activity enabled by World Wide Web (WWW). These days, many consu...
Adriano M. Pereira, Diego Duarte, Paulo Góe...
WWW
2009
ACM
16 years 5 months ago
A class-feature-centroid classifier for text categorization
Automated text categorization is an important technique for many web applications, such as document indexing, document filtering, and cataloging web resources. Many different appr...
Hu Guan, Jingyu Zhou, Minyi Guo
WWW
2008
ACM
16 years 5 months ago
Scaling RDF with time
The World Wide Web Consortium's RDF standard primarily consists of (subject,property,object) triples that specify the value that a given subject has for a given property. How...
Andrea Pugliese, Octavian Udrea, V. S. Subrahmania...
« Prev « First page 2025 / 2180 Last » Next »