Sciweavers

1025 search results - page 72 / 205
» Improved Behaviour of Tries by the
Sort
View
IAT
2007
IEEE
15 years 8 months ago
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bid...
INFOCOM
2007
IEEE
15 years 8 months ago
Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks
—Providing efficient and reliable communication in wireless sensor networks is a challenging problem. To recover from corrupted packets, previous approaches have tried to use re...
Qing Cao, Tarek F. Abdelzaher, Tian He, Robin Krav...
ICCBR
2007
Springer
15 years 8 months ago
An Analysis of Case-Based Value Function Approximation by Approximating State Transition Graphs
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
Thomas Gabel, Martin Riedmiller
MFCS
2007
Springer
15 years 8 months ago
Exact Algorithms for L (2, 1)-Labeling of Graphs
The notion of distance constrained graph labelings, motivated by the Frequency Assignment Problem, reads as follows: A mapping from the vertex set of a graph G = (V, E) into an in...
Jan Kratochvíl, Dieter Kratsch, Mathieu Lie...
94
Voted
WADS
2007
Springer
101views Algorithms» more  WADS 2007»
15 years 8 months ago
Edges and Switches, Tunnels and Bridges
Abstract. Edge casing is a well-known method to improve the readability of drawings of non-planar graphs. A cased drawing orders the edges of each edge crossing and interrupts the ...
David Eppstein, Marc J. van Kreveld, Elena Mumford...