Sciweavers

634 search results - page 100 / 127
» Finding trendsetters in information networks
Sort
View
CLEF
2010
Springer
15 years 27 days ago
A Cluster-Based Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
In this paper we describe a cluster-based plagiarism detection method, which we have used in the learning management system of SCUT to detect plagiarism in the network engineering ...
Du Zou, Wei-jiang Long, Zhang Ling
CSCW
2012
ACM
13 years 7 months ago
Coordination and beyond: social functions of groups in open content production
We report on a study of the English edition of Wikipedia in which we used a mixed methods approach to understand how nested organizational structures called WikiProjects support c...
Andrea Forte, Niki Kittur, Vanessa Larco, Haiyi Zh...
CSCW
2012
ACM
13 years 7 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 6 days ago
Unsupervised learning on k-partite graphs
Various data mining applications involve data objects of multiple types that are related to each other, which can be naturally formulated as a k-partite graph. However, the resear...
Bo Long, Xiaoyun Wu, Zhongfei (Mark) Zhang, Philip...
CCS
2007
ACM
15 years 6 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...