Sciweavers

9162 search results - page 106 / 1833
» System and User Data Complexity
Sort
View
TELSYS
2010
132views more  TELSYS 2010»
14 years 4 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
UM
2005
Springer
15 years 3 months ago
Temporal Blurring: A Privacy Model for OMS Users
Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users coul...
Rosa Alarcón, Luis A. Guerrero, José...
GRAPHICSINTERFACE
2003
14 years 11 months ago
Interactive Point-based Modeling of Complex Objects from Images
Modeling complex realistic objects is a difficult and time consuming process. Nevertheless, with improvements in rendering speed and quality, more and more applications require s...
Pierre Poulin, Marc Stamminger, François Du...
GLOBECOM
2007
IEEE
15 years 4 months ago
Downlink MIMO Block Diagonalization in the Presence of Other-Cell Interference
— Block diagonalization is one approach for linear precoding in the multiple-input multiple-output broadcast channel that sends multiple interference free data streams to differe...
Seijoon Shim, Jin Sam Kwak, Robert W. Heath Jr., J...
IV
2005
IEEE
149views Visualization» more  IV 2005»
15 years 3 months ago
Visualisation Techniques for Users and Designers of Layout Algorithms
Visualisation systems consisting of a set of components through which data and interaction commands flow have been explored by a number of researchers. Such hybrid and multistage ...
Greg Ross, Alistair Morrison, Matthew Chalmers