Sciweavers

6109 search results - page 1022 / 1222
» Ubiquitous Web Applications
Sort
View
168
Voted
ICDM
2010
IEEE
208views Data Mining» more  ICDM 2010»
15 years 2 months ago
Bonsai: Growing Interesting Small Trees
Graphs are increasingly used to model a variety of loosely structured data such as biological or social networks and entityrelationships. Given this profusion of large-scale graph ...
Stephan Seufert, Srikanta J. Bedathur, Juliá...
FIW
2009
120views Communications» more  FIW 2009»
15 years 2 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
183
Voted
OIR
2011
258views Neural Networks» more  OIR 2011»
14 years 11 months ago
The Effect of Social Influence on The Bloggers' Usage Intention
: Among Internet applications, blogs are known for its exponential growth in recent years. Blogs can be viewed as a kind of information system which people used to communicate with...
Shu-ming Wang, Judy Chuan-Chuan Lin
WWW
2011
ACM
14 years 11 months ago
EntityTagger: automatically tagging entities with descriptive phrases
We consider the problem of entity tagging: given one or more named entities from a specific domain, the goal is to automatically associate descriptive phrases, referred to as eta...
Kaushik Chakrabarti, Surajit Chaudhuri, Tao Cheng,...
HOTNETS
2010
14 years 11 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica
« Prev « First page 1022 / 1222 Last » Next »