Sciweavers

2705 search results - page 456 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
AFP
2004
Springer
128views Formal Methods» more  AFP 2004»
15 years 7 months ago
GEC: A Toolkit for Generic Rapid Prototyping of Type Safe Interactive Applications
Abstract. Programming GUIs with conventional GUI APIs is notoriously tedious. In these notes we present the GEC toolkit in which the programmer can create user interfaces without a...
Peter Achten, Marko C. J. D. van Eekelen, Rinus Pl...
SDM
2012
SIAM
216views Data Mining» more  SDM 2012»
13 years 4 months ago
Feature Selection "Tomography" - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable
:  Feature Selection “Tomography” - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable George Forman HP Laboratories HPL-2010-19R1 Feature selection; ...
George Forman
CEAS
2005
Springer
15 years 7 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
ISI
2006
Springer
15 years 1 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
CCS
2005
ACM
15 years 7 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...