There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
Abstract. Attention, which intervenes at many different levels such as the perception of the environment and the allocation of cognitive resources, appears to represent one of the ...
This paper describes a novel application of support vector machines and multiscale texture and color invariants to a problem in biological oceanography: the identification of 6 sp...
This paper proposes a novel approach to the visualization of complex, but interrelated, sets of information to ease user cognition. Principally, it explores the potential of provi...
Researchers have recognized the need for more expressive descriptions of Web services. Most approaches have suggested using ontologies to either describe the Web services or to an...
Nicole Oldham, Christopher Thomas, Amit P. Sheth, ...