Sciweavers

1498 search results - page 219 / 300
» Collection tree protocol
Sort
View
142
Voted
CEAS
2008
Springer
15 years 4 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
120
Voted
CASCON
2008
100views Education» more  CASCON 2008»
15 years 3 months ago
Is it a bug or an enhancement?: a text-based approach to classify change requests
Bug tracking systems are valuable assets for managing maintenance activities. They are widely used in open-source projects as well as in the software industry. They collect many d...
Giuliano Antoniol, Kamel Ayari, Massimiliano Di Pe...
111
Voted
LREC
2010
147views Education» more  LREC 2010»
15 years 3 months ago
Interacting Semantic Layers of Annotation in SoNaR, a Reference Corpus of Contemporary Written Dutch
This paper reports on the annotation of a corpus of 1 million words with four semantic annotation layers, including named entities, coreference relations, semantic roles and spati...
Ineke Schuurman, Véronique Hoste, Paola Mon...
111
Voted
IADIS
2008
15 years 3 months ago
Fuzzy Association Rule Reduction Using Clustering In Som Neural Network
The major drawback of fuzzy data mining is that after applying fuzzy data mining on the quantitative data, the number of extracted fuzzy association rules is very huge. When many ...
Marjan Kaedi, Mohammad Ali Nematbakhsh, Nasser Gha...
98
Voted
LREC
2008
109views Education» more  LREC 2008»
15 years 3 months ago
The Metadata-Database of a Next Generation Sustainability Web-Platform for Language Resources
Our goal is to provide a web-based platform for the long-term preservation and distribution of a heterogeneous collection of linguistic resources. We discuss the corpus preprocess...
Georg Rehm, Oliver Schonefeld, Andreas Witt, Timm ...