Sciweavers

3799 search results - page 690 / 760
» An Engineering Approach to Formal Methods
Sort
View
166
Voted
CCS
2007
ACM
15 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
AAAI
2006
15 years 5 months ago
Identification and Evaluation of Weak Community Structures in Networks
Identifying intrinsic structures in large networks is a fundamental problem in many fields, such as engineering, social science and biology. In this paper, we are concerned with c...
Jianhua Ruan, Weixiong Zhang
TASLP
2010
134views more  TASLP 2010»
14 years 11 months ago
Multiple Fundamental Frequency Estimation by Modeling Spectral Peaks and Non-Peak Regions
This paper presents a maximum likelihood approach to multiple fundamental frequency (F0) estimation for a mixture of harmonic sound sources, where the power spectrum of a time fra...
Zhiyao Duan, Bryan Pardo, Changshui Zhang
WSDM
2012
ACM
267views Data Mining» more  WSDM 2012»
13 years 11 months ago
Learning to rank with multi-aspect relevance for vertical search
Many vertical search tasks such as local search focus on specific domains. The meaning of relevance in these verticals is domain-specific and usually consists of multiple well-d...
Changsung Kang, Xuanhui Wang, Yi Chang, Belle L. T...
164
Voted
ER
2005
Springer
200views Database» more  ER 2005»
15 years 9 months ago
How to Tame a Very Large ER Diagram (Using Link Analysis and Force-Directed Drawing Algorithms)
Abstract. Understanding a large schema without the assistance of persons already familiar with it (and its associated applications), is a hard and very time consuming task that occ...
Yannis Tzitzikas, Jean-Luc Hainaut