Sciweavers

792 search results - page 110 / 159
» Finding Cost-Efficient Adapters
Sort
View
NSDI
2008
15 years 2 days ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
ARGMAS
2008
Springer
14 years 11 months ago
Annotation and Matching of First-Class Agent Interaction Protocols
Many practitioners view agent interaction protocols as rigid specifications that are defined a priori, and hard-code their agents with a set of protocols known at design time -- a...
Tim Miller, Peter McBurney
DEXA
2008
Springer
151views Database» more  DEXA 2008»
14 years 11 months ago
Extraction of Opposite Sentiments in Classified Free Format Text Reviews
Opinion mining received well attention in finding personal opinions from user generated content. These opinions contain valuable information for improving and/or comparing the prod...
Dong (Haoyuan) Li, Anne Laurent, Mathieu Roche, Pa...
EVOW
2008
Springer
14 years 11 months ago
Reactive Stochastic Local Search Algorithms for the Genomic Median Problem
Abstract. The genomic median problem is an optimization problem inspired by a biological issue: it aims at finding the chromosome organization of the common ancestor to multiple li...
Renaud Lenne, Christine Solnon, Thomas Stützl...
ALT
2010
Springer
14 years 11 months ago
Inferring Social Networks from Outbreaks
We consider the problem of inferring the most likely social network given connectivity constraints imposed by observations of outbreaks within the network. Given a set of vertices ...
Dana Angluin, James Aspnes, Lev Reyzin