Sciweavers

318 search results - page 39 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ML
2000
ACM
154views Machine Learning» more  ML 2000»
14 years 10 months ago
Lazy Learning of Bayesian Rules
The naive Bayesian classifier provides a simple and effective approach to classifier learning, but its attribute independence assumption is often violated in the real world. A numb...
Zijian Zheng, Geoffrey I. Webb
ACSAC
2010
IEEE
14 years 8 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
BMCBI
2008
143views more  BMCBI 2008»
14 years 10 months ago
Automatic detection of exonic splicing enhancers (ESEs) using SVMs
Background: Exonic splicing enhancers (ESEs) activate nearby splice sites and promote the inclusion (vs. exclusion) of exons in which they reside, while being a binding site for S...
Britta Mersch, Alexander Gepperth, Sándor S...
GIS
2010
ACM
14 years 8 months ago
Bridge detection in grid terrains and improved drainage enforcement
Bare Earth gridded digital elevation models (DEMs) are often used to extract hydrologic features such as rivers and watersheds. DEMs must be conditioned by removing spurious sinks...
Ryan Carlson, Andrew Danner
ISCA
2005
IEEE
79views Hardware» more  ISCA 2005»
15 years 3 months ago
Design and Evaluation of Hybrid Fault-Detection Systems
As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Up to now, system designers have prim...
George A. Reis, Jonathan Chang, Neil Vachharajani,...