Sciweavers

5758 search results - page 1116 / 1152
» Anonymity-preserving data collection
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
Finding bugs efficiently with a SAT solver
We present an approach for checking code against rich specifications, based on existing work that consists of encoding the program in a relational logic and using a constraint sol...
Julian Dolby, Mandana Vaziri, Frank Tip
WWW
2009
ACM
14 years 9 months ago
A measurement-driven analysis of information propagation in the flickr social network
Online social networking sites like MySpace, Facebook, and Flickr have become a popular way to share and disseminate content. Their massive popularity has led to viral marketing t...
Meeyoung Cha, Alan Mislove, P. Krishna Gummadi
WWW
2009
ACM
14 years 9 months ago
How much can behavioral targeting help online advertising?
Behavioral Targeting (BT) is a technique used by online advertisers to increase the effectiveness of their campaigns, and is playing an increasingly important role in the online a...
Jun Yan, Ning Liu, Gang Wang, Wen Zhang, Yun Jiang...
WWW
2009
ACM
14 years 9 months ago
A class-feature-centroid classifier for text categorization
Automated text categorization is an important technique for many web applications, such as document indexing, document filtering, and cataloging web resources. Many different appr...
Hu Guan, Jingyu Zhou, Minyi Guo
WWW
2008
ACM
14 years 9 months ago
A comparative analysis of web and peer-to-peer traffic
Peer-to-Peer (P2P) applications continue to grow in popularity, and have reportedly overtaken Web applications as the single largest contributor to Internet traffic. Using traces ...
Naimul Basher, Aniket Mahanti, Anirban Mahanti, Ca...
« Prev « First page 1116 / 1152 Last » Next »