Sciweavers

1759 search results - page 132 / 352
» Using term informativeness for named entity detection
Sort
View
IEEEARES
2010
IEEE
15 years 3 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
CIKM
2009
Springer
15 years 1 months ago
A co-classification framework for detecting web spam and spammers in social media web sites
Social media are becoming increasingly popular and have attracted considerable attention from spammers. Using a sample of more than ninety thousand known spam Web sites, we found ...
Feilong Chen, Pang-Ning Tan, Anil K. Jain
EUROPKI
2004
Springer
15 years 3 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
DGO
2008
170views Education» more  DGO 2008»
14 years 11 months ago
Natural language processing and e-Government: crime information extraction from heterogeneous data sources
Much information that could help solve and prevent crimes is never gathered because the reporting methods available to citizens and law enforcement personnel are not optimal. Dete...
Chih Hao Ku, Alicia Iriberri, Gondy Leroy
BMCBI
2010
104views more  BMCBI 2010»
14 years 10 months ago
A method for automatically extracting infectious disease-related primers and probes from the literature
Background: Primer and probe sequences are the main components of nucleic acid-based detection systems. Biologists use primers and probes for different tasks, some related to the ...
Miguel García-Remesal, Alejandro Cuevas, Vi...