Sciweavers

7978 search results - page 1521 / 1596
» Representation before computation
Sort
View
146
Voted
NSDI
2007
15 years 6 months ago
A Systematic Framework for Unearthing the Missing Links: Measurements and Impact
The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-d...
Yihua He, Georgos Siganos, Michalis Faloutsos, Sri...
ACMDIS
2008
ACM
15 years 6 months ago
Evaluating the effectiveness of term frequency histograms for supporting interactive web search tasks
Throughout many of the different types of Web searches people perform, the primary tasks are to first craft a query that effectively captures their information needs, and then eva...
Orland Hoeber, Xue Dong Yang
153
Voted
CCS
2008
ACM
15 years 6 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
CIE
2008
Springer
15 years 6 months ago
Recursion on Nested Datatypes in Dependent Type Theory
Nested datatypes are families of datatypes that are indexed over all types and where the datatype constructors relate different members of the family. This may be used to represent...
Ralph Matthes
ACMSE
2006
ACM
15 years 6 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
« Prev « First page 1521 / 1596 Last » Next »