Sciweavers

318 search results - page 51 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
LREC
2008
139views Education» more  LREC 2008»
14 years 11 months ago
Identification of Comparable Argument-Head Relations in Parallel Corpora
We present the machine learning framework that we are developing, in order to support explorative search for non-trivial linguistic configurations in low-density languages (langua...
Kathrin Spreyer, Jonas Kuhn, Bettina Schrader
CEAS
2008
Springer
15 years 1 days ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
IPOM
2009
Springer
15 years 4 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...
DSMML
2004
Springer
15 years 3 months ago
Object Recognition via Local Patch Labelling
Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
Christopher M. Bishop, Ilkay Ulusoy
SIGIR
1999
ACM
15 years 2 months ago
Information Retrieval as Statistical Translation
We propose a new probabilistic approach to information retrieval based upon the ideas and methods of statistical machine translation. The central ingredient in this approach is a ...
Adam L. Berger, John D. Lafferty