Sciweavers

1763 search results - page 190 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
106
Voted
NDSS
2006
IEEE
15 years 10 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
NSPW
2003
ACM
15 years 9 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
15 years 7 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
UAI
2004
15 years 5 months ago
Pre-Selection of Independent Binary Features: An Application to Diagnosing Scrapie in
Suppose that the only available information in a multi-class problem are expert estimates of the conditional probabilities of occurrence for a set of binary features. The aim is t...
Ludmila I. Kuncheva, Christopher J. Whitaker, Pete...
NAACL
1994
15 years 5 months ago
Multilingual Speech Databases at LDC
As multilingual products and technology grow in importance, the Linguistic Data Consortium (LDC) intends to provide the resources needed for research and development activities, e...
John J. Godfrey