Sciweavers

7082 search results - page 1348 / 1417
» A framework for mobile evaluation
Sort
View
179
Voted
CCS
2009
ACM
16 years 4 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CHI
2009
ACM
16 years 4 months ago
Making sense of strangers' expertise from signals in digital artifacts
Contemporary work increasingly involves interacting with strangers in technology-mediated environments. In this context, we come to rely on digital artifacts to infer characterist...
N. Sadat Shami, Kate Ehrlich, Geri Gay, Jeffrey T....
PPOPP
2009
ACM
16 years 4 months ago
MPIWiz: subgroup reproducible replay of mpi applications
Message Passing Interface (MPI) is a widely used standard for managing coarse-grained concurrency on distributed computers. Debugging parallel MPI applications, however, has alway...
Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Weng...
142
Voted
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
16 years 4 months ago
Efficiently learning the accuracy of labeling sources for selective sampling
Many scalable data mining tasks rely on active learning to provide the most useful accurately labeled instances. However, what if there are multiple labeling sources (`oracles...
Pinar Donmez, Jaime G. Carbonell, Jeff Schneider
134
Voted
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 4 months ago
Turning down the noise in the blogosphere
In recent years, the blogosphere has experienced a substantial increase in the number of posts published daily, forcing users to cope with information overload. The task of guidin...
Khalid El-Arini, Gaurav Veda, Dafna Shahaf, Carlos...
« Prev « First page 1348 / 1417 Last » Next »