Sciweavers

40 search results - page 1 / 8
» Why and How to Perform Fraud Experiments
Sort
View
IEEESP
2008
42views more  IEEESP 2008»
13 years 7 months ago
Why and How to Perform Fraud Experiments
Markus Jakobsson, Peter Finn, Nathaniel A. Johnson
CORR
2008
Springer
103views Education» more  CORR 2008»
13 years 7 months ago
When, why and how to test spreadsheets
Testing is a vital part of software development, and spreadsheets are like any other software in this respect. This paper discusses the testing of spreadsheets in the light of one...
Louise Pryor
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
14 years 2 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 7 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
SC
2004
ACM
14 years 28 days ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman