Sciweavers

2116 search results - page 423 / 424
» Resource Analysis by Sup-interpretation
Sort
View
124
Voted
NAR
2011
199views Computer Vision» more  NAR 2011»
14 years 6 months ago
FragmentStore - a comprehensive database of fragments linking metabolites, toxic molecules and drugs
Consideration of biomolecules in terms of their molecular building blocks provides valuable new information regarding their synthesis, degradation and similarity. Here, we present...
Jessica Ahmed, Catherine L. Worth, Paul Florian Th...
210
Voted
NLE
2011
14 years 6 months ago
Modeling reciprocity in social interactions with probabilistic latent space models
Reciprocity is a pervasive concept that plays an important role in governing people’s behavior, judgments, and thus their social interactions. In this paper we present an analys...
Roxana Girju, Michael J. Paul
163
Voted
CCS
2011
ACM
14 years 3 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
170
Voted
SIGIR
2012
ACM
13 years 5 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
158
Voted
ICSE
2012
IEEE-ACM
13 years 5 months ago
Performance debugging in the large via mining millions of stack traces
—Given limited resource and time before software release, development-site testing and debugging become more and more insufficient to ensure satisfactory software performance. As...
Shi Han, Yingnong Dang, Song Ge, Dongmei Zhang, Ta...