Sciweavers

15635 search results - page 2843 / 3127
» A Designing Model of XML-Dataweb
Sort
View
180
Voted
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 6 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
181
Voted
CVPR
2012
IEEE
13 years 6 months ago
Unsupervised feature learning framework for no-reference image quality assessment
In this paper, we present an efficient general-purpose objective no-reference (NR) image quality assessment (IQA) framework based on unsupervised feature learning. The goal is to...
Peng Ye, Jayant Kumar, Le Kang, David S. Doermann
178
Voted
CADE
2012
Springer
13 years 6 months ago
A Simplex-Based Extension of Fourier-Motzkin for Solving Linear Integer Arithmetic
Abstract. This paper describes a novel decision procedure for quantifierfree linear integer arithmetic. Standard techniques usually relax the initial problem to the rational domai...
François Bobot, Sylvain Conchon, Evelyne Co...
153
Voted
ICSE
2012
IEEE-ACM
13 years 6 months ago
What make long term contributors: Willingness and opportunity in OSS community
—To survive and succeed, software projects need to attract and retain contributors. We model the individual’s chances to become a valuable contributor through her capacity, wil...
Minghui Zhou, Audris Mockus
168
Voted
MOBISYS
2010
ACM
15 years 6 months ago
Augmenting mobile 3G using WiFi
We investigate if WiFi access can be used to augment 3G capacity in mobile environments. We first conduct a detailed study of 3G and WiFi access from moving vehicles, in three dif...
Aruna Balasubramanian, Ratul Mahajan, Arun Venkata...
« Prev « First page 2843 / 3127 Last » Next »