Sciweavers

1498 search results - page 219 / 300
» Collection tree protocol
Sort
View
CEAS
2008
Springer
13 years 11 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
CASCON
2008
100views Education» more  CASCON 2008»
13 years 10 months ago
Is it a bug or an enhancement?: a text-based approach to classify change requests
Bug tracking systems are valuable assets for managing maintenance activities. They are widely used in open-source projects as well as in the software industry. They collect many d...
Giuliano Antoniol, Kamel Ayari, Massimiliano Di Pe...
LREC
2010
147views Education» more  LREC 2010»
13 years 10 months ago
Interacting Semantic Layers of Annotation in SoNaR, a Reference Corpus of Contemporary Written Dutch
This paper reports on the annotation of a corpus of 1 million words with four semantic annotation layers, including named entities, coreference relations, semantic roles and spati...
Ineke Schuurman, Véronique Hoste, Paola Mon...
IADIS
2008
13 years 10 months ago
Fuzzy Association Rule Reduction Using Clustering In Som Neural Network
The major drawback of fuzzy data mining is that after applying fuzzy data mining on the quantitative data, the number of extracted fuzzy association rules is very huge. When many ...
Marjan Kaedi, Mohammad Ali Nematbakhsh, Nasser Gha...
LREC
2008
109views Education» more  LREC 2008»
13 years 10 months ago
The Metadata-Database of a Next Generation Sustainability Web-Platform for Language Resources
Our goal is to provide a web-based platform for the long-term preservation and distribution of a heterogeneous collection of linguistic resources. We discuss the corpus preprocess...
Georg Rehm, Oliver Schonefeld, Andreas Witt, Timm ...