Sciweavers

1486 search results - page 217 / 298
» Firewall Rules Analysis
Sort
View
CEAS
2008
Springer
15 years 1 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
LREC
2008
124views Education» more  LREC 2008»
15 years 1 months ago
Acquiring a Poor Man's Inflectional Lexicon for German
Many NLP modules and applications require the availability of a module for wide-coverage inflectional analysis. One way to obtain such analyses is to use an morphological analyser...
Peter Adolphs
CLA
2004
15 years 1 months ago
Planarity of Additively Drawn Concept Lattices
In Formal Concept Analysis, it is a very important but quite difficult task to draw line diagrams of concept lattices automatically. In particular, we want every planar lattice to ...
Christian Zschalig
FLAIRS
2004
15 years 1 months ago
Personalization Using Hybrid Data Mining Approaches in E-Business Applications
Effective personalization is greatly demanded in highly heterogeneous and diverse e-commerce domain. In our approach we rely on the idea that an effective personalization techniqu...
Olena Parkhomenko, Yugyung Lee, Chintan Patel
AAAI
2000
15 years 1 months ago
The Game of Hex: An Automatic Theorem Proving Approach to Game Programming
The game of Hex is a two-player game with simple rules, a deep underlying mathematical beauty, and a strategic complexity comparable to that of Chess and Go. The massive game-tree...
Vadim V. Anshelevich