Sciweavers

415 search results - page 48 / 83
» Identifying web spam with user behavior analysis
Sort
View
SIGSOFT
2008
ACM
14 years 9 months ago
Profile-guided program simplification for effective testing and analysis
Many testing and analysis techniques have been developed for inhouse use. Although they are effective at discovering defects before a program is deployed, these techniques are oft...
Lingxiao Jiang, Zhendong Su
CINQ
2004
Springer
189views Database» more  CINQ 2004»
14 years 2 months ago
Employing Inductive Databases in Concrete Applications
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
WINE
2009
Springer
202views Economy» more  WINE 2009»
14 years 3 months ago
A New Ranking Scheme of the GSP Mechanism with Markovian Users
Sponsored search auction is used by most search engines to select ads to display on the web page of a search result, according to advertisers’ bidding prices. The income of this ...
Xiaotie Deng, Jiajin Yu
ICST
2009
IEEE
14 years 3 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
WWW
2001
ACM
14 years 9 months ago
Support concepts for Web navigation: a cognitive engineering approach
Current Network User Interfaces (NUIs) provide entrances to an enormous amount of Web-based services, bringing about new use problems such as laborious and unsuccessful navigation...
Mark A. Neerincx, Jasper Lindenberg, Steven Pember...