Sciweavers

4051 search results - page 504 / 811
» Aggregation
Sort
View
ICSE
2009
IEEE-ACM
15 years 11 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
PAM
2009
Springer
15 years 11 months ago
Inferring Spammers in the Network Core
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern. Content-analysis techniques and blacklists, the m...
Dominik Schatzmann, Martin Burkhart, Thrasyvoulos ...
CSE
2009
IEEE
15 years 11 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 11 months ago
RDFStats - An Extensible RDF Statistics Generator and Library
—In this paper RDFStats is introduced, which is a generator for statistics of RDF sources like SPARQL endpoints and RDF documents. RDFStats does not only provide a statistics gen...
Andreas Langegger, Wolfram Wöß
DSRT
2009
IEEE
15 years 11 months ago
Human Flesh Search Model Incorporating Network Expansion and GOSSIP with Feedback
—With the development of on-line forum technology and the pervasive participation of the public, the Human Flesh Search is becoming an arising phenomenon which makes a great impa...
Bing Wang, Bonan Hou, Yiping Yao, Laibin Yan