Sciweavers

1060 search results - page 169 / 212
» Social language network analysis
Sort
View
SDM
2008
SIAM
139views Data Mining» more  SDM 2008»
15 years 1 months ago
Proximity Tracking on Time-Evolving Bipartite Graphs
Given an author-conference network that evolves over time, which are the conferences that a given author is most closely related with, and how do they change over time? Large time...
Hanghang Tong, Spiros Papadimitriou, Philip S. Yu,...
INFSOF
2006
90views more  INFSOF 2006»
14 years 11 months ago
Identifying knowledge brokers that yield software engineering knowledge in OSS projects
Much research on open source software development concentrates on developer lists and other software repositories to investigate what motivates professional software developers to...
Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angel...
ICDAR
2005
IEEE
15 years 5 months ago
Text Recognition of Low-resolution Document Images
Cheap and versatile cameras make it possible to easily and quickly capture a wide variety of documents. However, low resolution cameras present a challenge to OCR because it is vi...
Charles E. Jacobs, Patrice Y. Simard, Paul A. Viol...
MATA
2004
Springer
189views Communications» more  MATA 2004»
15 years 5 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
CCS
2003
ACM
15 years 5 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson