Sciweavers

1718 search results - page 243 / 344
» Modeling and testing of cloud applications
Sort
View
131
Voted
ICIDS
2010
Springer
15 years 1 months ago
Measuring User Responses to Interactive Stories: Towards a Standardized Assessment Tool
With the increasing number of prototypes and market applications of interactive storytelling, the understanding and optimization of how end users respond to computer-mediated inter...
Ivar E. Vermeulen, Christian Roth, Peter Vorderer,...
132
Voted
EMNLP
2009
15 years 1 months ago
Unsupervised morphological segmentation and clustering with document boundaries
Many approaches to unsupervised morphology acquisition incorporate the frequency of character sequences with respect to each other to identify word stems and affixes. This typical...
Taesun Moon, Katrin Erk, Jason Baldridge
133
Voted
ICDCS
2010
IEEE
15 years 7 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
123
Voted
KBSE
2005
IEEE
15 years 9 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
16 years 3 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider