Sciweavers

15644 search results - page 2998 / 3129
» Brittle System Analysis
Sort
View
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
14 years 5 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
WSDM
2010
ACM
227views Data Mining» more  WSDM 2010»
14 years 5 months ago
Folks in folksonomies: Social link prediction from shared metadata
Web 2.0 applications have attracted a considerable amount of attention because their open-ended nature allows users to create lightweight semantic scaffolding to organize and shar...
Rossano Schifanella, Alain Barrat, Ciro Cattuto, B...
SDM
2009
SIAM
235views Data Mining» more  SDM 2009»
14 years 5 months ago
Topic Cube: Topic Modeling for OLAP on Multidimensional Text Databases.
As the amount of textual information grows explosively in various kinds of business systems, it becomes more and more desirable to analyze both structured data records and unstruc...
ChengXiang Zhai, Duo Zhang, Jiawei Han
EUROSYS
2010
ACM
14 years 5 months ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie
EUROSYS
2007
ACM
14 years 5 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
« Prev « First page 2998 / 3129 Last » Next »