Sciweavers

524 search results - page 75 / 105
» Why phishing works
Sort
View
ECIS
2004
15 years 1 months ago
An Epistemological Foundation of Conceptual Modeling
In a business environment, making the right decisions is vital for the success of a company. Making right decisions is inevitably bound to the availability and provision of releva...
Michael Ribbert, Björn Niehaves, Alexander Dr...
IC
2004
15 years 1 months ago
Accurate Web Service Composition Using Global Data Schema
The emergence of Web Service has led to more research into Web Services composition. It has received much interest to support business-to-business or enterprise application integra...
Shoujian Yu, Chao Yang, Jiajin Le
TREC
2004
15 years 1 months ago
UIUC in HARD 2004--Passage Retrieval Using HMMs
UIUC participated in the HARD track in TREC 2004 and focused on the evaluation of a new method for identifying variable-length passages using HMMs. Most existing approaches to pas...
Jing Jiang, ChengXiang Zhai
NIPS
1996
15 years 1 months ago
Combinations of Weak Classifiers
To obtain classification systems with both good generalizat`ion performance and efficiency in space and time, we propose a learning method based on combinations of weak classifiers...
Chuanyi Ji, Sheng Ma
AAAI
1992
15 years 1 months ago
From Statistics to Beliefs
An intelligent agent uses known facts, including statistical knowledge, to assign degrees of belief to assertions it is uncertain about. We investigate three principled techniques...
Fahiem Bacchus, Adam J. Grove, Daphne Koller, Jose...