Sciweavers

2244 search results - page 182 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
NDSS
1999
IEEE
15 years 6 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu
133
Voted
WWW
2008
ACM
16 years 3 months ago
Exploring social annotations for information retrieval
Social annotation has gained increasing popularity in many Web-based applications, leading to an emerging research area in text analysis and information retrieval. This paper is c...
Ding Zhou, Jiang Bian, Shuyi Zheng, Hongyuan Zha, ...
AOSD
2009
ACM
15 years 9 days ago
Concept analysis for product line requirements
Traditional methods characterize a software product line's requirements using either functional or quality criteria. This appears to be inadequate to assess modularity, detec...
Nan Niu, Steve M. Easterbrook
IMC
2003
ACM
15 years 7 months ago
An analysis of Internet chat systems
In our quest to better understand network traffic dynamics, we examine Internet chat systems. Although chat as an application does not contribute huge amounts of traffic, chat sys...
Christian Dewes, Arne Wichmann, Anja Feldmann
WWW
2006
ACM
16 years 3 months ago
Detecting spam web pages through content analysis
In this paper, we continue our investigations of "web spam": the injection of artificially-created pages into the web in order to influence the results from search engin...
Alexandros Ntoulas, Marc Najork, Mark Manasse, Den...