Sciweavers

3007 search results - page 383 / 602
» Designing for collective remembering
Sort
View
72
Voted
CCS
2009
ACM
15 years 8 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
KDD
2009
ACM
347views Data Mining» more  KDD 2009»
15 years 8 months ago
FpViz: a visualizer for frequent pattern mining
Over the past 15 years, numerous algorithms have been proposed for frequent pattern mining as it plays an essential role in many knowledge discovery and data mining (KDD) tasks. M...
Carson Kai-Sang Leung, Christopher L. Carmichael
PAKDD
2009
ACM
116views Data Mining» more  PAKDD 2009»
15 years 8 months ago
Scalable Web Mining with Newistic
Abstract. Newistic is a web mining platform that collects and analyses documents crawled from the Internet. Although it currently processes news articles, it can be easily adapted ...
Ovidiu Dan, Horatiu Mocian
TACAS
2009
Springer
127views Algorithms» more  TACAS 2009»
15 years 8 months ago
From Tests to Proofs
We describe the design and implementation of an automatic invariant generator for imperative programs. While automatic invariant generation through constraint solving has been exte...
Ashutosh Gupta, Rupak Majumdar, Andrey Rybalchenko
CCGRID
2009
IEEE
15 years 8 months ago
Harvesting Large-Scale Grids for Software Resources
— Grid infrastructures are in operation around the world, federating an impressive collection of computational resources and a wide variety of application software. In this conte...
Asterios Katsifodimos, George Pallis, Marios D. Di...