Sciweavers

734 search results - page 97 / 147
» A Method for Teaching a Software Process based on the Person...
Sort
View
CIKM
2007
Springer
14 years 3 months ago
Finding and linking incidents in news
News reports are being produced and disseminated in overwhelming volume, making it difficult to keep up with the newest information. Most previous research in automatic news organ...
Ao Feng, James Allan
CCS
2005
ACM
14 years 2 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
HT
2010
ACM
13 years 10 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
KDD
2006
ACM
272views Data Mining» more  KDD 2006»
14 years 9 months ago
YALE: rapid prototyping for complex data mining tasks
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Radical Approach to Network-on-Chip Operating Systems
Operating systems were created to provide multiple tasks with access to scarce hardware resources like CPU, memory, or storage. Modern programmable hardware, however, may contain ...
Michael Engel, Olaf Spinczyk