Sciweavers

1483 search results - page 273 / 297
» An Analysis of Factors Used in Search Engine Ranking
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
WWW
2010
ACM
14 years 3 months ago
Not so creepy crawler: easy crawler generation with standard xml queries
Web crawlers are increasingly used for focused tasks such as the extraction of data from Wikipedia or the analysis of social networks like last.fm. In these cases, pages are far m...
Franziska von dem Bussche, Klara A. Weiand, Benedi...
ASWEC
2009
IEEE
14 years 3 months ago
Semantic Impact and Faults in Source Code Changes: An Empirical Study
Changes to source code have become a critical factor in fault predictions. Text or syntactic approaches have been widely used. Textual analysis focuses on changed text fragments w...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
ICSE
2011
IEEE-ACM
13 years 2 days ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
PODS
2008
ACM
159views Database» more  PODS 2008»
14 years 8 months ago
Approximation algorithms for clustering uncertain data
There is an increasing quantity of data with uncertainty arising from applications such as sensor network measurements, record linkage, and as output of mining algorithms. This un...
Graham Cormode, Andrew McGregor