Sciweavers

1288 search results - page 113 / 258
» Algorithmic detection of semantic similarity
Sort
View
CIKM
2005
Springer
15 years 3 months ago
Establishing value mappings using statistical models and user feedback
In this paper, we present a “value mapping” algorithm that does not rely on syntactic similarity or semantic interpretation of the values. The algorithm first constructs a st...
Jaewoo Kang, Tae Sik Han, Dongwon Lee, Prasenjit M...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
15 years 10 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
SIGSOFT
2010
ACM
14 years 8 months ago
Instant code clone search
In this paper, we propose a scalable instant code clone search engine for large-scale software repositories. While there are commercial code search engines available, they treat s...
Mu-Woong Lee, Jong-Won Roh, Seung-won Hwang, Sungh...
RECSYS
2009
ACM
15 years 2 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
WWW
2005
ACM
15 years 10 months ago
Browsing fatigue in handhelds: semantic bookmarking spells relief
Focused Web browsing activities such as periodically looking up headline news, weather reports, etc., which require only selective fragments of particular Web pages, can be made m...
Saikat Mukherjee, I. V. Ramakrishnan