Sciweavers

3257 search results - page 630 / 652
» Discretization based learning approach to information retrie...
Sort
View
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 7 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
APWEB
2005
Springer
15 years 7 months ago
Mining Quantitative Associations in Large Database
Association Rule Mining algorithms operate on a data matrix to derive association rule, discarding the quantities of the items, which contains valuable information. In order to mak...
Chenyong Hu, Yongji Wang, Benyu Zhang, Qiang Yang,...
SIGCSE
2004
ACM
168views Education» more  SIGCSE 2004»
15 years 6 months ago
Design, science, and engineering topics?: teaching HCI with a unified method
Reacting to challenges that have been observed in humancomputer interaction (HCI) education, as well as the multidisciplinary design, science, and engineering underpinnings, we in...
D. Scott McCrickard, Christa M. Chewar, Jacob P. S...
ACSAC
2003
IEEE
15 years 6 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
IUI
2003
ACM
15 years 6 months ago
Abbreviated text input
We address the problem of improving the efficiency of natural language text input under degraded conditions (for instance, on PDAs or cell phones or by disabled users) by taking a...
Stuart M. Shieber, Ellie Baker