Sciweavers

409 search results - page 67 / 82
» Review spam detection
Sort
View
IVS
2008
145views more  IVS 2008»
14 years 11 months ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...
MSR
2011
ACM
14 years 2 months ago
Do time of day and developer experience affect commit bugginess
Modern software is often developed over many years with hundreds of thousands of commits. Commit metadata is a rich source of social characteristics, including the commit’s time...
Jon Eyolfson, Lin Tan, Patrick Lam
ICSM
2009
IEEE
15 years 6 months ago
Maintenance and agile development: Challenges, opportunities and future directions
Software entropy is a phenomenon where repeated changes gradually degrade the structure of the system, making it hard to understand and maintain. This phenomenon imposes challenge...
Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar...
ICAIL
2009
ACM
15 years 6 months ago
Query-based opinion summarization for legal blog entries
We present the first report of automatic sentiment summarization in the legal domain. This work is based on processing a set of legal questions with a system consisting of a semi...
Jack G. Conrad, Jochen L. Leidner, Frank Schilder,...
KBSE
2007
IEEE
15 years 6 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr