Sciweavers

713 search results - page 98 / 143
» Reasoning with Projected Contours
Sort
View
134
Voted
WWW
2003
ACM
16 years 4 months ago
Detecting Near-replicas on the Web by Content and Hyperlink Analysis
The presence of replicas or near-replicas of documents is very common on the Web. Documents may be replicated completely or partially for different reasons (versions, mirrors, etc...
Ernesto Di Iorio, Michelangelo Diligenti, Marco Go...
CHI
2007
ACM
16 years 4 months ago
Decision-making strategies in design meetings
This project aims to further our understanding of the practice of user-centered design (UCD) by observing the argumentation strategies used by designers in faceto-face meetings in...
Erin Friess
ICSE
2009
IEEE-ACM
15 years 10 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
141
Voted
SEMCO
2009
IEEE
15 years 10 months ago
Understanding Implicit Entities and Events with Getaruns
- Semantic processing represents the new challenge for all applications that require text understanding, as for instance Q/A. In this paper we will highlight the need to couple sta...
Rodolfo Delmonte
103
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...