Sciweavers

277 search results - page 55 / 56
» From Reversible to Irreversible Computations
Sort
View
CEAS
2005
Springer
14 years 4 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
SIGCOMM
2003
ACM
14 years 4 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
BMCBI
2008
111views more  BMCBI 2008»
13 years 11 months ago
GENOMEPOP: A program to simulate genomes in populations
Background: There are several situations in population biology research where simulating DNA sequences is useful. Simulation of biological populations under different evolutionary...
Antonio Carvajal-Rodríguez
CI
2006
101views more  CI 2006»
13 years 10 months ago
Sentiment Classification of Movie Reviews Using Contextual Valence Shifters
We present two methods for determining the sentiment expressed by a movie review. The semantic orientation of a review can be positive, negative, or neutral. We examine the effect...
Alistair Kennedy, Diana Inkpen
JCIT
2007
132views more  JCIT 2007»
13 years 10 months ago
Analysis and Implementation of M-commerce in Education for Developing Countries (Uzbekistan case)
M-commerce is one of the ways IT can significantly contribute to boosting economy of the developing countries. M-commerce project has a high potential in the developing countries ...
Olga Yugay, Aleksey Semyonov, Il Seok Ko, Sarvar R...