Sciweavers

2623 search results - page 433 / 525
» tools 2010
Sort
View
CCS
2010
ACM
13 years 10 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
SAC
2010
ACM
13 years 10 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
ENVSOFT
2008
80views more  ENVSOFT 2008»
13 years 9 months ago
Modifications to the SWAT code for modelling direct pesticide losses
In different river catchments in Europe, pesticide concentrations in surface waters frequently exceed the standards, possibly resulting in negative impacts on aquatic fauna and fl...
K. Holvoet, A. van Griensven, V. Gevaert, P. Seunt...
ICMCS
2010
IEEE
181views Multimedia» more  ICMCS 2010»
13 years 8 months ago
LDPC FEC code extension for unequal error protection in 2nd generation DVB systems
One of the envisioned advantages of scalable video coding is its inherent suitability for achieving unequal error protection (UEP). UEP can be effectively used for graceful qualit...
Lukasz Kondrad, Imed Bouazizi, Moncef Gabbouj
JAPLL
2010
98views more  JAPLL 2010»
13 years 8 months ago
Formalization of the ad hominem argumentation scheme
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been w...
Douglas Walton