Sciweavers

297 search results - page 22 / 60
» Heap Reference Analysis Using Access Graphs
Sort
View
141
Voted
CIKM
2008
Springer
15 years 4 months ago
A random walk on the red carpet: rating movies with user reviews and pagerank
Although PageRank has been designed to estimate the popularity of Web pages, it is a general algorithm that can be applied to the analysis of other graphs other than one of hypert...
Derry Tanti Wijaya, Stéphane Bressan
ICICS
2005
Springer
15 years 7 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
POPL
2008
ACM
16 years 2 months ago
Automatic inference of stationary fields: a generalization of java's final fields
Java programmers can document that the relationship between two objects is unchanging by declaring the field that encodes that relationship to be final. This information can be us...
Christopher Unkel, Monica S. Lam
SMI
2008
IEEE
181views Image Analysis» more  SMI 2008»
15 years 8 months ago
Example based skeletonization using harmonic one-forms
This paper presents a method to extract skeletons using examples. Our method is based on the observation that many deformations in real world applications are isometric or near is...
Ying He 0001, Xian Xiao, Hock Soon Seah
KDD
2001
ACM
262views Data Mining» more  KDD 2001»
16 years 2 months ago
LOGML: Log Markup Language for Web Usage Mining
Web Usage Mining refers to the discovery of interesting information from user navigational behavior as stored in web access logs. While extracting simple information from web logs...
John R. Punin, Mukkai S. Krishnamoorthy, Mohammed ...