Sciweavers

5463 search results - page 1052 / 1093
» Evaluating algorithms that learn from data streams
Sort
View
SIGSOFT
2005
ACM
15 years 6 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
86
Voted
BMCBI
2006
103views more  BMCBI 2006»
15 years 16 days ago
Domain-based small molecule binding site annotation
Background: Accurate small molecule binding site information for a protein can facilitate studies in drug docking, drug discovery and function prediction, but small molecule bindi...
Kevin A. Snyder, Howard J. Feldman, Michel Dumonti...
SIGIR
2011
ACM
14 years 3 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
118
Voted
CCS
2011
ACM
14 years 13 days ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
152
Voted
CIKM
1997
Springer
15 years 4 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
« Prev « First page 1052 / 1093 Last » Next »