Sciweavers

1779 search results - page 356 / 356
» Patterns of Component Evolution
Sort
View
CCS
2011
ACM
12 years 5 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
CIKM
2011
Springer
12 years 5 months ago
S3K: seeking statement-supporting top-K witnesses
Traditional information retrieval techniques based on keyword search help to identify a ranked set of relevant documents, which often contains many documents in the top ranks that...
Steffen Metzger, Shady Elbassuoni, Katja Hose, Ral...
BMCBI
2010
240views more  BMCBI 2010»
13 years 5 months ago
TAM: A method for enrichment and depletion analysis of a microRNA category in a list of microRNAs
Background: MicroRNAs (miRNAs) are a class of important gene regulators. The number of identified miRNAs has been increasing dramatically in recent years. An emerging major challe...
Ming Lu, Bing Shi, Juan Wang, Qun Cao, Qinghua Cui
SENSYS
2010
ACM
13 years 3 months ago
Surviving wi-fi interference in low power ZigBee networks
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...