Sciweavers

26 search results - page 5 / 6
» Fighting Two Pirates
Sort
View
CEAS
2008
Springer
13 years 8 months ago
Detecting Known and New Salting Tricks in Unwanted Emails
Spam and phishing emails are not only annoying to users, but are a real threat to internet communication and web economy. The fight against unwanted emails has become a cat-and-mo...
André Bergholz, Gerhard Paass, Frank Reicha...
DAGSTUHL
2009
13 years 7 months ago
Advances in Feature Selection with Mutual Information
The selection of features that are relevant for a prediction or classification problem is an important problem in many domains involving high-dimensional data. Selecting features h...
Michel Verleysen, Fabrice Rossi, Damien Fran&ccedi...
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
13 years 10 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
ICIS
2004
13 years 7 months ago
Are Digital Rights Valuable? Theory and Evidence from the eBook Industry
The effective management of digital rights is a crucial challenge in many industries making the transition from physical to digital products. We present an economic model that cha...
Gal Oestreicher-Singer, Arun Sundararajan
CNIS
2006
13 years 7 months ago
Dynamically blocking access to web pages for spammers' harvesters
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Tobias Eggendorfer, Jörg Keller