Sciweavers

3547 search results - page 678 / 710
» Pseudo-Exhaustive Testing for Software
Sort
View
90
Voted
WWW
2009
ACM
15 years 10 months ago
Rapid development of spreadsheet-based web mashups
The rapid growth of social networking sites and web communities have motivated web sites to expose their APIs to external developers who create mashups by assembling existing func...
Woralak Kongdenfha, Boualem Benatallah, Julien Vay...
WWW
2008
ACM
15 years 10 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...
80
Voted
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
15 years 10 months ago
On-board analysis of uncalibrated data for a spacecraft at mars
Analyzing data on-board a spacecraft as it is collected enables several advanced spacecraft capabilities, such as prioritizing observations to make the best use of limited bandwid...
Benyang Tang, Kiri Wagstaff, Rebecca Castañ...
KDD
2006
ACM
272views Data Mining» more  KDD 2006»
15 years 10 months ago
YALE: rapid prototyping for complex data mining tasks
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
15 years 10 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan