Sciweavers

8294 search results - page 1628 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
CIKM
2005
Springer
15 years 5 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CCS
2004
ACM
15 years 5 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
AGENTS
1999
Springer
15 years 4 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
OPODIS
2007
15 years 1 months ago
Peer to Peer Multidimensional Overlays: Approximating Complex Structures
Peer to peer overlay networks have proven to be a good support for storing and retrieving data in a fully decentralized way. A sound approach is to structure them in such a way tha...
Olivier Beaumont, Anne-Marie Kermarrec, Etienne Ri...
ENVSOFT
2007
54views more  ENVSOFT 2007»
14 years 11 months ago
Evaluation of landscape and instream modeling to predict watershed nutrient yields
The project goal was to loosely couple the SWAT model and the QUAL2E model and compare their combined ability to predict total phosphorus (TP) and NO3-N plus NO2-N yields to the a...
K. W. Migliaccio, I. Chaubey, B. E. Haggard
« Prev « First page 1628 / 1659 Last » Next »