Sciweavers

3925 search results - page 458 / 785
» Measuring software evolution
Sort
View
WWW
2008
ACM
16 years 4 months ago
Web graph similarity for anomaly detection (poster)
Web graphs are approximate snapshots of the web, created by search engines. Their creation is an error-prone procedure that relies on the availability of Internet nodes and the fa...
Panagiotis Papadimitriou 0002, Ali Dasdan, Hector ...
CCS
2009
ACM
15 years 11 months ago
Fides: remote anomaly-based cheat detection using client emulation
As a result of physically owning the client machine, cheaters in online games currently have the upper-hand when it comes to avoiding detection. To address this problem and turn t...
Edward C. Kaiser, Wu-chang Feng, Travis Schluessle...
COMSWARE
2006
IEEE
15 years 10 months ago
Spread-based heuristic for sensor selection in sensor networks
In this paper we propose a method for selecting an appropriate subset of sensors with a view to minimize estimation error while tracking a target with sensors spread across in a 2...
Vaishali P. Sadaphal, Bijendra N. Jain
154
Voted
JCDL
2005
ACM
111views Education» more  JCDL 2005»
15 years 9 months ago
Developing practical automatic metadata assignment and evaluation tools for internet resources
This paper describes the development of practical automatic metadata assignment tools to support automatic record creation for virtual libraries, metadata repositories and digital...
Gordon W. Paynter
SAC
2005
ACM
15 years 9 months ago
Using object-level run-time metrics to study coupling between objects
In this paper we present an investigation into the run-time behaviour of objects in Java programs, using specially adapted coupling metrics. We identify objects from the same clas...
Áine Mitchell, James F. Power