Sciweavers

7913 search results - page 482 / 1583
» Information Collection on a Graph
Sort
View
161
Voted
TMA
2010
Springer
140views Management» more  TMA 2010»
15 years 2 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
ECCC
2011
205views ECommerce» more  ECCC 2011»
15 years 1 days ago
Graphs of Bounded Treewidth can be Canonized in AC1
In recent results the complexity of isomorphism testing on graphs of bounded treewidth is improved to TC1 [GV06] and further to LogCFL [DTW10]. The computation of canonical forms ...
Fabian Wagner
SIGIR
2009
ACM
15 years 11 months ago
What queries are likely to recur in web search?
We study the recurrence dynamics of queries in Web search by analysing a large real-world query log dataset. We find that query frequency is more useful in predicting collective ...
Dell Zhang, Jinsong Lu
123
Voted
SIGIR
2009
ACM
15 years 11 months ago
The ESA retrieval model revisited
Among the retrieval models that have been proposed in the last years, the ESA model of Gabrilovich and Markovitch received much attention. The authors report on a significant imp...
Maik Anderka, Benno Stein
123
Voted
VL
2008
IEEE
15 years 11 months ago
Towards the next generation of bug tracking systems
Developers typically rely on the information submitted by end-users to resolve bugs. We conducted a survey on information needs and commonly faced problems with bug reporting amon...
Sascha Just, Rahul Premraj, Thomas Zimmermann