Sciweavers

415 search results - page 81 / 83
» Identifying web spam with user behavior analysis
Sort
View
NLE
2011
12 years 8 months ago
Modeling reciprocity in social interactions with probabilistic latent space models
Reciprocity is a pervasive concept that plays an important role in governing people’s behavior, judgments, and thus their social interactions. In this paper we present an analys...
Roxana Girju, Michael J. Paul
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 9 days ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
PLDI
2003
ACM
13 years 11 months ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program’s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...
ICDE
2010
IEEE
206views Database» more  ICDE 2010»
13 years 7 months ago
HECATAEUS: Regulating Schema Evolution
HECATAEUS is an open-source software tool for enabling impact prediction, what-if analysis, and regulation of relational database schema evolution. We follow a graph theoretic appr...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
DOCENG
2004
ACM
13 years 11 months ago
Instructional information in adaptive spatial hypertext
Spatial hypertext is an effective medium for the delivery of help and instructional information on the Web. Spatial hypertext’s intrinsic features allow documents to visually re...
Luis Francisco-Revilla, Frank M. Shipman III