Sciweavers

2027 search results - page 245 / 406
» When is it best to best-respond
Sort
View
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
15 years 4 months ago
Spam Email Filtering Using Network-Level Properties
Abstract. Spam is serious problem that affects email users (e.g. phishing attacks, viruses and time spent reading unwanted messages). We propose a novel spam email filtering appr...
Paulo Cortez, André Correia, Pedro Sousa, M...
KDD
2010
ACM
275views Data Mining» more  KDD 2010»
15 years 4 months ago
Combined regression and ranking
Many real-world data mining tasks require the achievement of two distinct goals when applied to unseen data: first, to induce an accurate preference ranking, and second to give g...
D. Sculley
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 4 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
AIPS
2008
15 years 3 months ago
Multi-Objective Evolutionary Algorithms for Scheduling the James Webb Space Telescope
Effective scheduling of the James Webb Space Telescope (JWST) requires managing the trade-off between multiple scheduling criteria including minimizing unscheduled time, angular m...
Mark E. Giuliano, Mark D. Johnston
USENIX
2007
15 years 3 months ago
Evaluating Block-level Optimization Through the IO Path
This paper focuses on evaluation of the effectiveness of optimization at various layers of the IO path, such as the file system, the device driver scheduler, and the disk drive i...
Alma Riska, James Larkby-Lahet, Erik Riedel