Sciweavers

675 search results - page 107 / 135
» Using Fairness to Make Abstractions Work
Sort
View
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 3 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
ECIR
2009
Springer
14 years 9 months ago
Refining Keyword Queries for XML Retrieval by Combining Content and Structure
Abstract. The structural heterogeneity and complexity of XML repositories makes query formulation challenging for users who have little knowledge of XML. To assist its users, an XM...
Desislava Petkova, W. Bruce Croft, Yanlei Diao
ML
2010
ACM
127views Machine Learning» more  ML 2010»
14 years 10 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby
MATES
2005
Springer
15 years 5 months ago
Collaborative Agent-Based Knowledge Support for Empirical and Knowledge-Intense Processes
Independent from specific application domains, similar requirements can be identified regarding information needs during daily work. For coping with generality on the one hand an...
Andrea Freßmann, Kerstin Maximini, Rainer Ma...
ICS
2003
Tsinghua U.
15 years 5 months ago
miNI: reducing network interface memory requirements with dynamic handle lookup
Recent work in low-latency, high-bandwidth communication systems has resulted in building user–level Network InControllers (NICs) and communication abstractions that support dir...
Reza Azimi, Angelos Bilas