Sciweavers

1340 search results - page 82 / 268
» Spam Filter Analysis
Sort
View
IEEECIT
2010
IEEE
15 years 3 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
ICASSP
2010
IEEE
15 years 5 months ago
Sparse Bayesian step-filtering for high-throughput analysis of molecular machine dynamics
Nature has evolved many molecular machines such as kinesin, myosin, and the rotary flagellar motor powered by an ion current from the mitochondria. Direct observation of the step-...
Max A. Little, Nick S. Jones
WWW
2008
ACM
16 years 5 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
WWW
2010
ACM
15 years 12 months ago
Measurement and analysis of an online content voting network: a case study of Digg
In online content voting networks, aggregate user activities (e.g., submitting and rating content) make high-quality content thrive through the unprecedented scale, high dynamics ...
Yingwu Zhu
ICPR
2004
IEEE
16 years 6 months ago
Filtering with Gray-Code Kernels
In this paper we introduce a family of filter kernels the Gray-Code Kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of Gray-Code Kern...
Gil Ben-Artzi, Hagit Hel-Or, Yacov Hel-Or