Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
Large software projects often require a programmer to make changes to unfamiliar source code. This paper presents the results of a formative observational study of seven professio...
Robert DeLine, Amir Khella, Mary Czerwinski, Georg...
Nowadays contents in Internet like weblogs, wikipedia and news sites become "live". How to notify and provide users with the relevant contents becomes a challenge. Unlike...
Weixiong Rao, Ada Wai-Chee Fu, Lei Chen 0002, Hanh...
To exploit the similarity information hidden in the hyperlink structure of the web, this paper introduces algorithms scalable to graphs with billions of vertices on a distributed ...
Recent work has shown that visual attributes are a powerful approach for applications such as recognition, image description and retrieval. However, fusing multiple attribute scor...
Walter J. Scheirer, Neeraj Kumar, Peter N. Belhume...