Sciweavers

7640 search results - page 1498 / 1528
» Event Database Processing
Sort
View
USENIX
2007
14 years 6 days ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
MSR
2010
ACM
13 years 12 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
CIKM
2008
Springer
13 years 12 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
CIKM
2008
Springer
13 years 12 months ago
How should users access the content of digital books?
I report briefly on some of my own work in each of these areas and elucidate some of the questions that this research has raised. Then I propose as a research agenda the developme...
Nina Wacholder
BNCOD
2007
96views Database» more  BNCOD 2007»
13 years 11 months ago
Extracting Temporal Information from Short Messages
Abstract. Information Extraction, the process of eliciting data from natural language documents, usually relies on the ability to parse the document and then to detect the meaning ...
Richard Cooper, Sinclair Manson
« Prev « First page 1498 / 1528 Last » Next »