Sciweavers

371 search results - page 46 / 75
» A New Method for Interoperability Test Generation
Sort
View
115
Voted
CEAS
2008
Springer
15 years 3 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 7 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
ICASSP
2010
IEEE
15 years 2 months ago
Weakly supervised learning with decision trees applied to fisheries acoustics
This paper addresses the training of classification trees for weakly labelled data. We call ”weakly labelled data”, a training set such as the prior labelling information pro...
Riwal Lefort, Ronan Fablet, Jean-Marc Boucher
TVCG
2012
187views Hardware» more  TVCG 2012»
13 years 4 months ago
Effective Replays and Summarization of Virtual Experiences
—Direct replays of the experience of a user in a virtual environment are difficult for others to watch due to unnatural camera motions. We present methods for replaying and summ...
Kevin Ponto, Joe Kohlmann, Michael Gleicher
ML
2006
ACM
15 years 7 months ago
Seminal: searching for ML type-error messages
We present a new way to generate type-error messages in a polymorphic, implicitly, and strongly typed language (specifically Caml). Our method separates error-message generation ...
Benjamin S. Lerner, Dan Grossman, Craig Chambers