Sciweavers

522 search results - page 59 / 105
» What's a Typical Commit
Sort
View
ICON
2007
IEEE
14 years 2 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
AUSAI
2007
Springer
14 years 1 months ago
Not All Words Are Created Equal: Extracting Semantic Orientation as a Function of Adjective Relevance
Semantic orientation (SO) for texts is often determined on the basis of the positive or negative polarity, or sentiment, found in the text. Polarity is typically extracted using th...
Kimberly D. Voll, Maite Taboada
CP
2007
Springer
14 years 1 months ago
Model-Driven Visualizations of Constraint-Based Local Search
Visualization is often invaluable to understand the behavior of optimization algorithms, identify their bottlenecks or pathological behaviors, and suggest remedial techniques. Yet ...
Grégoire Dooms, Pascal Van Hentenryck, Laur...
ERCIMDL
2007
Springer
87views Education» more  ERCIMDL 2007»
14 years 1 months ago
Thesaurus-Based Feedback to Support Mixed Search and Browsing Environments
We propose and evaluate a query expansion mechanism that supports searching and browsing in collections of annotated documents. Based on generative language models, our feedback me...
Edgar Meij, Maarten de Rijke
ICSE
2007
IEEE-ACM
14 years 1 months ago
Languages for Safety-Critical Software: Issues and Assessment
Safety-critical systems (whose anomalous behavior could have catastrophic consequences such as loss of human life) are becoming increasingly prevalent; standards such as DO-178B, ...
Benjamin M. Brosgol