Sciweavers

1898 search results - page 326 / 380
» Weak Keys for IDEA
Sort
View
SIGSOFT
2009
ACM
14 years 9 months ago
DebugAdvisor: a recommender system for debugging
In large software development projects, when a programmer is assigned a bug to fix, she typically spends a lot of time searching (in an ad-hoc manner) for instances from the past ...
B. Ashok, Joseph M. Joy, Hongkang Liang, Sriram K....
SIGSOFT
2008
ACM
14 years 9 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
WWW
2009
ACM
14 years 9 months ago
A measurement-driven analysis of information propagation in the flickr social network
Online social networking sites like MySpace, Facebook, and Flickr have become a popular way to share and disseminate content. Their massive popularity has led to viral marketing t...
Meeyoung Cha, Alan Mislove, P. Krishna Gummadi
WWW
2008
ACM
14 years 9 months ago
WWW 2008 workshop: NLPIX2008 summary
The amount of information available on the Web has increased rapidly, reaching levels that few would ever have imagined possible. We live in what could be called the "informa...
Hiroshi Nakagawa, Kentaro Torisawa, Marasu Kitsure...
WWW
2005
ACM
14 years 9 months ago
Incremental page rank computation on evolving graphs
Link Analysis has been a popular and widely used Web mining technique, especially in the area of Web search. Various ranking schemes based on link analysis have been proposed, of ...
Prasanna Kumar Desikan, Nishith Pathak, Jaideep Sr...