Sciweavers

1748 search results - page 330 / 350
» interact 2003
Sort
View
140
Voted
SIGSOFT
2003
ACM
16 years 3 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
148
Voted
WWW
2003
ACM
16 years 3 months ago
The chatty web: emergent semantics through gossiping
This paper describes a novel approach for obtaining semantic interoperability among data sources in a bottom-up, semiautomatic manner without relying on pre-existing, global seman...
Karl Aberer, Manfred Hauswirth, Philippe Cudr&eacu...
WWW
2003
ACM
16 years 3 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
KDD
2003
ACM
190views Data Mining» more  KDD 2003»
16 years 3 months ago
Distance-enhanced association rules for gene expression
We introduce a novel data mining technique for the analysis of gene expression. Gene expression is the effective production of the protein that a gene encodes. We focus on the cha...
Aleksandar Icev, Carolina Ruiz, Elizabeth F. Ryder
123
Voted
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
16 years 3 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel