Sciweavers

1629 search results - page 245 / 326
» A Study of Malcode-Bearing Documents
Sort
View
KDD
2007
ACM
151views Data Mining» more  KDD 2007»
14 years 8 months ago
Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggrava...
Chao Liu 0001, David Lo, Siau-Cheng Khoo
EUROSYS
2010
ACM
14 years 27 days ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
TKDE
2011
183views more  TKDE 2011»
13 years 2 months ago
Mining Discriminative Patterns for Classifying Trajectories on Road Networks
—Classification has been used for modeling many kinds of data sets, including sets of items, text documents, graphs, and networks. However, there is a lack of study on a new kind...
Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hong Cheng
SIGIR
2010
ACM
13 years 11 months ago
Positional relevance model for pseudo-relevance feedback
Pseudo-relevance feedback is an effective technique for improving retrieval results. Traditional feedback algorithms use a whole feedback document as a unit to extract words for ...
Yuanhua Lv, ChengXiang Zhai
CLEF
2008
Springer
13 years 9 months ago
UJM at ImageCLEFwiki 2008
This paper reports our multimedia information retrieval experiments carried out for the ImageCLEF track (ImageCLEFwiki). The task is to answer to user information needs, i.e. quer...
Christophe Moulin, Cécile Barat, Mathias G&...