Sciweavers

176 search results - page 16 / 36
» Generalized Modularity for Community Detection
Sort
View
AIRWEB
2009
Springer
14 years 5 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 2 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
AOSD
2009
ACM
13 years 8 months ago
Concept analysis for product line requirements
Traditional methods characterize a software product line's requirements using either functional or quality criteria. This appears to be inadequate to assess modularity, detec...
Nan Niu, Steve M. Easterbrook
ICCV
2011
IEEE
12 years 11 months ago
End-to-end Scene Text Recognition
This paper focuses on the problem of word detection and recognition in natural images. The problem is significantly more challenging than reading text in scanned documents, and h...
Kai Wang, Boris Babenko, Serge Belongie
KBSE
2005
IEEE
14 years 4 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer