Sciweavers

728 search results - page 79 / 146
» New Directions in Question Answering
Sort
View
JALC
2006
125views more  JALC 2006»
15 years 1 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
PKDD
2010
Springer
178views Data Mining» more  PKDD 2010»
14 years 12 months ago
Large-Scale Support Vector Learning with Structural Kernels
Abstract. In this paper, we present an extensive study of the cuttingplane algorithm (CPA) applied to structural kernels for advanced text classification on large datasets. In par...
Aliaksei Severyn, Alessandro Moschitti
FLAIRS
2010
14 years 11 months ago
Game Based Training for Fighter Pilots
How could computer games be used to augment training for fighter pilots? This paper is aimed at providing one answer to this research question. Three current methods of training f...
Jeremy Ludwig, Robert Richards, Jeff Lovelace
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
14 years 5 months ago
Is Happiness Contagious Online? A Case of Twitter and the 2010 Winter Olympics
Is happiness contagious online? To answer this question, this paper investigates the posting behavior of users on Twitter.com, a popular online service for sharing short messages....
Anatoliy A. Gruzd, Sophie Doiron, Philip Mai
CHI
2011
ACM
14 years 5 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...