Sciweavers

176 search results - page 14 / 36
» Generalized Modularity for Community Detection
Sort
View
ICSE
2010
IEEE-ACM
13 years 9 months ago
Code clone detection in practice
Due to the negative impact of code cloning on software maintenance efforts as well as on program correctness [4–6], the duplication of code is generally viewed as problematic. ...
Florian Deissenboeck, Benjamin Hummel, Elmar J&uum...
ICIP
2001
IEEE
15 years 13 days ago
Face detection using large margin classifiers
Large margin classifiers have demonstrated their advantages in many visual learning tasks, and have attracted much attention in vision and image processing communities. In this pa...
Ming-Hsuan Yang, Dan Roth, Narendra Ahuja
CCS
2006
ACM
14 years 2 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
ISSTA
2006
ACM
14 years 4 months ago
Application of automated environment generation to commercial software
Model checking can be an effective technique for detecting concurrency-related errors in software systems. However, due to scalability issues, to handle industrial-strength softw...
Oksana Tkachuk, Sreeranga P. Rajan
AIRWEB
2008
Springer
14 years 27 days ago
The anti-social tagger: detecting spam in social bookmarking systems
The annotation of web sites in social bookmarking systems has become a popular way to manage and find information on the web. The community structure of such systems attracts spam...
Beate Krause, Christoph Schmitz, Andreas Hotho, Ge...