Sciweavers

713 search results - page 98 / 143
» Reasoning with Projected Contours
Sort
View
WWW
2003
ACM
14 years 9 months ago
Detecting Near-replicas on the Web by Content and Hyperlink Analysis
The presence of replicas or near-replicas of documents is very common on the Web. Documents may be replicated completely or partially for different reasons (versions, mirrors, etc...
Ernesto Di Iorio, Michelangelo Diligenti, Marco Go...
CHI
2007
ACM
14 years 9 months ago
Decision-making strategies in design meetings
This project aims to further our understanding of the practice of user-centered design (UCD) by observing the argumentation strategies used by designers in faceto-face meetings in...
Erin Friess
ICSE
2009
IEEE-ACM
14 years 3 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
SEMCO
2009
IEEE
14 years 3 months ago
Understanding Implicit Entities and Events with Getaruns
- Semantic processing represents the new challenge for all applications that require text understanding, as for instance Q/A. In this paper we will highlight the need to couple sta...
Rodolfo Delmonte
IEEEIAS
2009
IEEE
14 years 3 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...