Sciweavers

1715 search results - page 256 / 343
» Document Retrieval using a Probabilistic Knowledge Model
Sort
View
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
15 years 1 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
DL
1999
Springer
139views Digital Library» more  DL 1999»
15 years 2 months ago
Constructing Web Views from Automated Navigation Sessions
Existing web search engines provide users with the ability to query an off-line database of indices in order to decide on an entry point for further manual navigation. Results are...
Nadav Zin, Mark Levene
ADHOC
2007
115views more  ADHOC 2007»
14 years 10 months ago
Modeling adaptive node capture attacks in multi-hop wireless networks
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
Patrick Tague, Radha Poovendran
ICTAI
2007
IEEE
15 years 4 months ago
Establishing Logical Rules from Empirical Data
We review a method of generating logical rules, or axioms, from empirical data. This method, using closed set properties of formal concept analysis, has been previously described ...
John L. Pfaltz
DSN
2005
IEEE
14 years 11 months ago
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors
Soft errors are a growing concern for processor reliability. Recent work has motivated architecture-level studies of soft errors since the architecture can mask many raw errors an...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...