Sciweavers

738 search results - page 139 / 148
» Object Orientation and Formal Techniques
Sort
View
WSDM
2012
ACM
352views Data Mining» more  WSDM 2012»
13 years 6 months ago
Multi-relational matrix factorization using bayesian personalized ranking for social network data
A key element of the social networks on the internet such as Facebook and Flickr is that they encourage users to create connections between themselves, other users and objects. On...
Artus Krohn-Grimberghe, Lucas Drumond, Christoph F...
OOPSLA
2004
Springer
15 years 4 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
HT
1987
ACM
15 years 2 months ago
Exploring Representation Problems Using Hypertext
Hypertext is a technology well-suited to exploring different kinds of representational problems. It can be used first as an informal mechanism to describe the attributes of object...
Catherine C. Marshall
DAGSTUHL
2007
15 years 6 days ago
Exploiting the ASM method within the Model-driven Engineering paradigm
act notation, so separating the abstract syntax and semantics of the language constructs from their different concrete notations. Although the foundation constituents of the MDE a...
Angelo Gargantini, Elvinia Riccobene, Patrizia Sca...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
15 years 11 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye