Sciweavers

2947 search results - page 396 / 590
» Analyzing Program Analyses
Sort
View
136
Voted
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
16 years 2 months ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo
126
Voted
CHI
2008
ACM
16 years 2 months ago
Interlaced QWERTY: accommodating ease of visual search and input flexibility in shape writing
Shape writing is an input technology for touch-screen mobile phones and pen-tablets. To shape write text, the user spells out word patterns by sliding a finger or stylus over a gr...
Shumin Zhai, Per Ola Kristensson
127
Voted
EDBT
2002
ACM
141views Database» more  EDBT 2002»
16 years 2 months ago
Efficient OLAP Query Processing in Distributed Data Warehouses
Abstract. The success of Internet applications has led to an explosive growth in the demand for bandwidth from ISPs. Managing an IP network requires collecting and analyzing networ...
Michael O. Akinde, Michael H. Böhlen, Theodor...
107
Voted
ICCD
2006
IEEE
113views Hardware» more  ICCD 2006»
15 years 11 months ago
A theory of Error-Rate Testing
— We have entered an era where chip yields are decreasing with scaling. A new concept called intelligible testing has been previously proposed with the goal of reversing this tre...
Shideh Shahidi, Sandeep Gupta
119
Voted
SOSP
2007
ACM
15 years 11 months ago
AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications
The rise of the software-as-a-service paradigm has led to the development of a new breed of sophisticated, interactive applications often called Web 2.0. While web applications ha...
Emre Kiciman, V. Benjamin Livshits