Sciweavers

4795 search results - page 7 / 959
» The Message Classification Model
Sort
View
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
15 years 10 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
61
Voted
CHI
2010
ACM
15 years 4 months ago
PIM-Mail: consolidating task and email management
Traditional email clients are built with a “one-touch” model in mind that assumes an immediate action is performed once an email is read. However, some emails require a follow...
Jan-Peter Krämer
FORTE
2010
14 years 11 months ago
On Efficient Models for Model Checking Message-Passing Distributed Protocols
Abstract. The complexity of distributed algorithms, such as state machine replication, motivates the use of formal methods to assist correctness verification. The design of the for...
Péter Bokor, Marco Serafini, Neeraj Suri
98
Voted
COMPSEC
2010
146views more  COMPSEC 2010»
14 years 9 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
DAIS
2003
14 years 11 months ago
A Flexible Middleware Layer for User-to-User Messaging
Abstract. There is growing trend to unify user-to-user messaging systems to allow message exchange, independent of time, place, protocol, and end-user device. Building gateways to ...
Jan-Mark S. Wams, Maarten van Steen