Sciweavers

1483 search results - page 250 / 297
» An Analysis of Factors Used in Search Engine Ranking
Sort
View
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 6 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
IUI
2009
ACM
14 years 5 months ago
Learning to recognize valuable tags
Many websites use tags as a mechanism for improving item metadata through collective user effort. Users of tagging systems often apply far more tags to an item than a system can ...
Shilad Sen, Jesse Vig, John Riedl
UIST
2009
ACM
14 years 3 months ago
CommunityCommands: command recommendations for software applications
We explore the use of modern recommender system technology to address the problem of learning software applications. Before describing our new command recommender system, we first...
Justin Matejka, Wei Li, Tovi Grossman, George W. F...
KBSE
2008
IEEE
14 years 3 months ago
Random Test Run Length and Effectiveness
Abstract—A poorly understood but important factor in random testing is the selection of a maximum length for test runs. Given a limited time for testing, it is seldom clear wheth...
James H. Andrews, Alex Groce, Melissa Weston, Ru-G...
MSR
2006
ACM
14 years 2 months ago
Mining email social networks in Postgres
Open Source Software (OSS) projects provide a unique opportunity to gather and analyze publicly available historical data. The Postgres SQL server, for example, has over seven yea...
Christian Bird, Alex Gourley, Premkumar T. Devanbu...