Sciweavers

712 search results - page 139 / 143
» Effective, Automatic Procedure Extraction
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
WWW
2001
ACM
14 years 8 months ago
Placing search in context: the concept revisited
We describe a new paradigm for performing search in context. In the IntelliZap system we developed, search is initiated from a text query marked by the user in a document she view...
Lev Finkelstein, Evgeniy Gabrilovich, Yossi Matias...
KDD
2005
ACM
182views Data Mining» more  KDD 2005»
14 years 7 months ago
Making holistic schema matching robust: an ensemble approach
The Web has been rapidly "deepened" by myriad searchable databases online, where data are hidden behind query interfaces. As an essential task toward integrating these m...
Bin He, Kevin Chen-Chuan Chang
WWW
2010
ACM
14 years 2 months ago
Exploiting social context for review quality prediction
Online reviews in which users publish detailed commentary about their experiences and opinions with products, services, or events are extremely valuable to users who rely on them ...
Yue Lu, Panayiotis Tsaparas, Alexandros Ntoulas, L...
CIKM
2009
Springer
14 years 1 months ago
MagicCube: choosing the best snippet for each aspect of an entity
Wikis are currently used in business to provide knowledge management systems, especially for individual organizations. However, building wikis manually is a laborious and time-con...
Yexin Wang, Li Zhao, Yan Zhang