Sciweavers

701 search results - page 78 / 141
» Comments on
Sort
View
IAT
2007
IEEE
15 years 10 months ago
User Participation in Social Media: Digg Study
The social news aggregator Digg allows users to submit and moderate stories by voting on (digging) them. As is true of most social sites, user participation on Digg is nonuniforml...
Kristina Lerman
ISCA
2007
IEEE
128views Hardware» more  ISCA 2007»
15 years 10 months ago
Performance and security lessons learned from virtualizing the alpha processor
Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isola...
Paul A. Karger
KBSE
2007
IEEE
15 years 10 months ago
Feature location via information retrieval based filtering of a single scenario execution trace
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...
Dapeng Liu, Andrian Marcus, Denys Poshyvanyk, Vacl...
WECWIS
2007
IEEE
159views ECommerce» more  WECWIS 2007»
15 years 10 months ago
A Rapid Egocentric Search Scheme Using Authority Estimation in Blog Space
A blog is a new media that is receiving a lot of attention. Its links enable us to get a hold of social relations between bloggers in a blog space, and the relations reflect blogg...
Yoonjae Jeong, Dongman Lee
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada