Sciweavers

5962 search results - page 880 / 1193
» Working with Patterns and Code
Sort
View
SCP
2008
144views more  SCP 2008»
15 years 4 months ago
Implicit ownership types for memory management
Abstract. The Real-time Specification for Java (RTSJ) introduced a range of language features for explicit memory management. While the RTSJ gives programmers fine control over mem...
Tian Zhao, Jason Baker, James Hunt, James Noble, J...
SIGIR
2008
ACM
15 years 4 months ago
A comparative evaluation of different link types on enhancing document clustering
With a growing number of works utilizing link information in enhancing document clustering, it becomes necessary to make a comparative evaluation of the impacts of different link ...
Xiaodan Zhang, Xiaohua Hu, Xiaohua Zhou
147
Voted
SIGIR
2008
ACM
15 years 4 months ago
To personalize or not to personalize: modeling queries with variation in user intent
In most previous work on personalized search algorithms, the results for all queries are personalized in the same manner. However, as we show in this paper, there is a lot of vari...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
SIGMETRICS
2008
ACM
143views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Pictures from the Skype
This demo focuses on the online characterization and classification of Skype traffic, a very popular and fashionable VoIP application nowadays. Building over previous work on the ...
Dario Rossi, Silvio Valenti, Paolo Veglia, Dario B...
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 4 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...