Sciweavers

8177 search results - page 1477 / 1636
» Detecting System Emulators
Sort
View
111
Voted
CONEXT
2008
ACM
15 years 5 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
138
Voted
ESEM
2007
ACM
15 years 5 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche
149
Voted
CSCW
2008
ACM
15 years 5 months ago
The language of emotion in short blog texts
Emotion is central to human interactions, and automatic detection could enhance our experience with technologies. We investigate the linguistic expression of fine-grained emotion ...
Alastair J. Gill, Robert M. French, Darren Gergle,...
138
Voted
DASFAA
2008
IEEE
137views Database» more  DASFAA 2008»
15 years 5 months ago
Efficient Mining of Recurrent Rules from a Sequence Database
We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventuall...
David Lo, Siau-Cheng Khoo, Chao Liu 0001
145
Voted
ICAIL
2007
ACM
15 years 5 months ago
Semantic Spaces and Multilingualism in the Law: The Challenge of Legal Knowledge Management
It is the concern of the author to arrange cogitations and experiences she gained by collaborating in relevant international project works, by conducting scientific studies regard...
Doris Liebwald
« Prev « First page 1477 / 1636 Last » Next »