Sciweavers

4177 search results - page 804 / 836
» On the Performance of Ant-based Clustering
Sort
View
ICDM
2008
IEEE
235views Data Mining» more  ICDM 2008»
14 years 3 months ago
DECK: Detecting Events from Web Click-Through Data
In the past few years there has been increased research interest in detecting previously unidentified events from Web resources. Our focus in this paper is to detect events from ...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
ICSM
2008
IEEE
14 years 3 months ago
Understanding the rationale for updating a function's comment
Up-to-date comments are critical for the successful evolution of a software application. When modifying a function, developers may update the comment associated with the function ...
Haroon Malik, Istehad Chowdhury, Hsiao-Ming Tsou, ...
INFOCOM
2008
IEEE
14 years 3 months ago
Multi-Channel Live P2P Streaming: Refocusing on Servers
Abstract—Due to peer instability and time-varying peer upload bandwidth availability in live peer-to-peer (P2P) streaming channels, it is preferable to provision adequate levels ...
Chuan Wu, Baochun Li, Shuqiao Zhao
IV
2008
IEEE
296views Visualization» more  IV 2008»
14 years 3 months ago
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
Romain Bourqui, Fabien Jourdan
NDSS
2008
IEEE
14 years 3 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...