Sciweavers

20745 search results - page 4021 / 4149
» Computer graphics for all
Sort
View
ECRIME
2007
15 years 1 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
EPEW
2007
Springer
15 years 1 months ago
An Efficient Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), broadcasting plays a fundamental role, diffusing a message from a given source node to all the other nodes in the network. Flooding is the simpl...
Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mack...
DASFAA
2010
IEEE
190views Database» more  DASFAA 2010»
15 years 1 months ago
k-Selection Query over Uncertain Data
This paper studies a new query on uncertain data, called k-selection query. Given an uncertain dataset of N objects, where each object is associated with a preference score and a p...
Xingjie Liu, Mao Ye, Jianliang Xu, Yuan Tian, Wang...
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
15 years 1 months ago
Direct mining of discriminative patterns for classifying uncertain data
Classification is one of the most essential tasks in data mining. Unlike other methods, associative classification tries to find all the frequent patterns existing in the input...
Chuancong Gao, Jianyong Wang
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 1 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
« Prev « First page 4021 / 4149 Last » Next »