Sciweavers

398 search results - page 73 / 80
» Automatic Keyword Extraction on Twitter
Sort
View
SIGSOFT
2007
ACM
15 years 11 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
116
Voted
WWW
2008
ACM
15 years 11 months ago
LocalSavvy: aggregating local points of view about news issues
The web has become an important medium for news delivery and consumption. Fresh content about a variety of topics, events, and places is constantly being created and published on ...
Jiahui Liu, Larry Birnbaum
94
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 11 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
15 years 11 months ago
Web site mining: a new way to spot competitors, customers and suppliers in the world wide web
When automatically extracting information from the world wide web, most established methods focus on spotting single HTMLdocuments. However, the problem of spotting complete web s...
Martin Ester, Hans-Peter Kriegel, Matthias Schuber...
POPL
2006
ACM
15 years 10 months ago
Autolocker: synchronization inference for atomic sections
The movement to multi-core processors increases the need for simpler, more robust parallel programming models. Atomic sections have been widely recognized for their ease of use. T...
Bill McCloskey, Feng Zhou, David Gay, Eric A. Brew...