Sciweavers

398 search results - page 73 / 80
» Automatic Keyword Extraction on Twitter
Sort
View
107
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
WWW
2008
ACM
16 years 28 days ago
LocalSavvy: aggregating local points of view about news issues
The web has become an important medium for news delivery and consumption. Fresh content about a variety of topics, events, and places is constantly being created and published on ...
Jiahui Liu, Larry Birnbaum
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 20 days ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
16 years 20 days ago
Web site mining: a new way to spot competitors, customers and suppliers in the world wide web
When automatically extracting information from the world wide web, most established methods focus on spotting single HTMLdocuments. However, the problem of spotting complete web s...
Martin Ester, Hans-Peter Kriegel, Matthias Schuber...
POPL
2006
ACM
16 years 17 days ago
Autolocker: synchronization inference for atomic sections
The movement to multi-core processors increases the need for simpler, more robust parallel programming models. Atomic sections have been widely recognized for their ease of use. T...
Bill McCloskey, Feng Zhou, David Gay, Eric A. Brew...