Sciweavers

1128 search results - page 129 / 226
» Structuring anonymity metrics
Sort
View
IEEEARES
2006
IEEE
14 years 4 months ago
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information infrastructures has become an even more important issue. To enhance network surviv...
Y.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y...
IPPS
2006
IEEE
14 years 4 months ago
Ant-inspired query routing performance in dynamic peer-to-peer networks
P2P Networks are highly dynamic structures since their nodes – peer users keep joining and leaving continuously. In the paper, we study the effects of network change rates on qu...
Mojca Ciglaric, Tone Vidmar
MSR
2006
ACM
14 years 4 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.
SIGIR
2006
ACM
14 years 4 months ago
Contextual search and name disambiguation in email using graphs
Similarity measures for text have historically been an important tool for solving information retrieval problems. In many interesting settings, however, documents are often closel...
Einat Minkov, William W. Cohen, Andrew Y. Ng
DEXAW
2005
IEEE
170views Database» more  DEXAW 2005»
14 years 3 months ago
Functional Annotation of Genes through Statistical Analysis of Biomedical Articles
One of the most elaborate and important tasks in biology is the functional annotation of genes. Biologists have developed standardized and structured vocabularies, called bio-onto...
Theodosios Theodosiou, Lefteris Angelis, Athena Va...