Sciweavers

411 search results - page 49 / 83
» Extracting Temporal Information from Short Messages
Sort
View
AIPRF
2008
14 years 11 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
BMCBI
2010
109views more  BMCBI 2010»
14 years 10 months ago
Structural alphabets derived from attractors in conformational space
Background: The hierarchical and partially redundant nature of protein structures justifies the definition of frequently occurring conformations of short fragments as `states'...
Alessandro Pandini, Arianna Fornili, Jens Kleinjun...
JCM
2008
138views more  JCM 2008»
14 years 9 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
ESWS
2007
Springer
15 years 3 months ago
Empowering Moodle with Rules and Semantics
This short paper describes preliminary ideas for empowering e-learning platform Moodle with rules and semantics. Many existing web applications already contain a lot of structured ...
Sergey Lukichev, Ion-Mircea Diaconescu, Adrian Giu...
SPIRE
2007
Springer
15 years 3 months ago
Highly Frequent Terms and Sentence Retrieval
In this paper we propose a novel sentence retrieval method based on extracting highly frequent terms from top retrieved documents. We compare it against state of the art sentence r...
David E. Losada, Ronald T. Fernández