Sciweavers

2995 search results - page 416 / 599
» On multi-avoidance of generalized patterns
Sort
View
115
Voted
HT
2010
ACM
15 years 8 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...
158
Voted
JCDL
2010
ACM
259views Education» more  JCDL 2010»
15 years 8 months ago
Exploiting time-based synonyms in searching document archives
Query expansion of named entities can be employed in order to increase the retrieval effectiveness. A peculiarity of named entities compared to other vocabulary terms is that they...
Nattiya Kanhabua, Kjetil Nørvåg
101
Voted
MSR
2010
ACM
15 years 8 months ago
Do stack traces help developers fix bugs?
—A widely shared belief in the software engineering community is that stack traces are much sought after by developers to support them in debugging. But limited empirical evidenc...
Adrian Schröter, Nicolas Bettenburg, Rahul Pr...
PASTE
2010
ACM
15 years 8 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
INFOCOM
2002
IEEE
15 years 8 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin