Sciweavers

9189 search results - page 1743 / 1838
» Biological data mining
Sort
View
AINA
2010
IEEE
14 years 7 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
CHI
2011
ACM
14 years 7 months ago
Human computation: a survey and taxonomy of a growing field
The rapid growth of human computation within research and industry has produced many novel ideas aimed at organizing web users to do great things. However, the growth is not adequ...
Alexander J. Quinn, Benjamin B. Bederson
139
Voted
ASUNAM
2011
IEEE
14 years 3 months ago
Predicting Network Response Times Using Social Information
—Social networks and discussion boards have become a significant outlet where people communicate and express their opinion freely. Although the social networks themselves are us...
Chen Liang, Sharath Hiremagalore, Angelos Stavrou,...
FASE
2012
Springer
13 years 11 months ago
Cohesive and Isolated Development with Branches
The adoption of distributed version control (DVC), such as Git and Mercurial, in open-source software (OSS) projects has been explosive. Why is this and how are projects using DVC?...
Earl T. Barr, Christian Bird, Peter C. Rigby, Abra...
IUI
2012
ACM
13 years 11 months ago
Summarizing sporting events using twitter
The status updates posted to social networks, such as Twitter and Facebook, contain a myriad of information about what people are doing and watching. During events, such as sports...
Jeffrey Nichols, Jalal Mahmud, Clemens Drews
« Prev « First page 1743 / 1838 Last » Next »