Sciweavers

978 search results - page 60 / 196
» Knowledge, Probability, and Adversaries
Sort
View
AAAI
2006
14 years 11 months ago
Exploring GnuGo's Evaluation Function with a SVM
While computers have defeated the best human players in many classic board games, progress in Go remains elusive. The large branching factor in the game makes traditional adversar...
Christopher Fellows, Yuri Malitsky, Gregory Wojtas...
IJNSEC
2008
129views more  IJNSEC 2008»
14 years 10 months ago
Repairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the propos...
Zuhua Shao
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 8 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
OPODIS
2010
14 years 7 months ago
SkewCCC+: A Heterogeneous Distributed Hash Table
Distributed Hash Tables (DHTs) enable fully distributed Peer-to-Peer network construction and maintenance with name-driven routing. There exist very few DHT approaches that conside...
Marcin Bienkowski, André Brinkmann, Marek K...
WWW
2011
ACM
14 years 4 months ago
Detecting group review spam
It is well-known that many online reviews are not written by genuine users of products, but by spammers who write fake reviews to promote or demote some target products. Although ...
Arjun Mukherjee, Bing Liu, Junhui Wang, Natalie S....