Sciweavers

1636 search results - page 292 / 328
» Detecting similar software applications
Sort
View
WIDM
2005
ACM
15 years 7 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
UML
2005
Springer
15 years 7 months ago
Exceptional Use Cases
Many exceptional situations arise during the execution of an application. When developing dependable software, the first step is to foresee these exceptional situations and docume...
Aaron Shui, Sadaf Mustafiz, Jörg Kienzle, Chr...
CC
2005
Springer
153views System Software» more  CC 2005»
15 years 7 months ago
Completeness Analysis for Incomplete Object-Oriented Programs
We introduce a new approach, called completeness analysis, to computing points-to sets for incomplete Java programs such as library modules or applications in the presence of dynam...
Jingling Xue, Phung Hua Nguyen
ASPLOS
2004
ACM
15 years 7 months ago
Deconstructing storage arrays
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. Shear employs a set of controlled algorithms combined with statistical techniques to automat...
Timothy E. Denehy, John Bent, Florentina I. Popovi...
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
15 years 7 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld