Sciweavers

1350 search results - page 208 / 270
» Generalized Committed Choice
Sort
View
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 4 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
250
Voted
POPL
2007
ACM
16 years 4 months ago
Program verification as probabilistic inference
In this paper, we propose a new algorithm for proving the validity or invalidity of a pre/postcondition pair for a program. The algorithm is motivated by the success of the algori...
Sumit Gulwani, Nebojsa Jojic
114
Voted
CSCW
2010
ACM
16 years 24 days ago
What's it worth to you?: the costs and affordances of CMC tools to asian and american users
In recent years, a growing number of studies examining how culture shapes computer-mediated communication (CMC) have appeared in the CHI and CSCW literature. Findings from these s...
Leslie D. Setlock, Susan R. Fussell
161
Voted
CCS
2009
ACM
15 years 10 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
129
Voted
CCS
2009
ACM
15 years 10 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...