Sciweavers

2732 search results - page 502 / 547
» SIGA, a System to Manage Information Retrieval Evaluations
Sort
View
121
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 2 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
123
Voted
MSR
2005
ACM
15 years 7 months ago
Towards a taxonomy of approaches for mining of source code repositories
Source code version repositories provide a treasure of information encompassing the changes introduced in the system throughout its evolution. These repositories are typically man...
Huzefa H. Kagdi, Michael L. Collard, Jonathan I. M...
98
Voted
GECCO
2004
Springer
119views Optimization» more  GECCO 2004»
15 years 7 months ago
Learning Environment for Life Time Value Calculation of Customers in Insurance Domain
A critical success factor in Insurance business is its ability to use information sources and contained knowledge in the most effective way. Its profitability is obtained through t...
Andrea Tettamanzi, Luca Sammartino, Mikhail Simono...
SIGMOD
2007
ACM
134views Database» more  SIGMOD 2007»
16 years 2 months ago
Updating a cracked database
A cracked database is a datastore continuously reorganized based on operations being executed. For each query, the data of interest is physically reclustered to speed-up future ac...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
HICSS
2006
IEEE
92views Biometrics» more  HICSS 2006»
15 years 8 months ago
An Integrative Framework for Contextual Factors Affecting IT Implementation
While previous research has provided a great deal of information on individual factors that play a role in IT implementation success, a gap in the research exists when it comes to...
Barbara Edington, Namchul Shin