Sciweavers

1466 search results - page 292 / 294
» Improving Web Information Systems with Navigational Patterns
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
Which warnings should I fix first?
Automatic bug-finding tools have a high false positive rate: most warnings do not indicate real bugs. Usually bug-finding tools assign important warnings high priority. However, t...
Sunghun Kim, Michael D. Ernst
POPL
2008
ACM
14 years 8 months ago
Engineering formal metatheory
Machine-checked proofs of properties of programming languages have become a critical need, both for increased confidence in large and complex designs and as a foundation for techn...
Arthur Charguéraud, Benjamin C. Pierce, Bri...
STOC
2005
ACM
164views Algorithms» more  STOC 2005»
14 years 8 months ago
Cooperative asynchronous update of shared memory
The Write-All problem for an asynchronous shared-memory system has the objective for the processes to update the contents of a set of shared registers, while minimizing the mber o...
Bogdan S. Chlebus, Dariusz R. Kowalski
CCS
2007
ACM
14 years 1 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
PR
2006
164views more  PR 2006»
13 years 7 months ago
Locally linear metric adaptation with application to semi-supervised clustering and image retrieval
Many computer vision and pattern recognition algorithms are very sensitive to the choice of an appropriate distance metric. Some recent research sought to address a variant of the...
Hong Chang, Dit-Yan Yeung