Sciweavers

524 search results - page 79 / 105
» Why phishing works
Sort
View
JAIR
2010
147views more  JAIR 2010»
14 years 6 months ago
Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction
The Aviation Safety Reporting System collects voluntarily submitted reports on aviation safety incidents to facilitate research work aiming to reduce such incidents. To effectivel...
Muhammad Arshad Ul Abedin, Vincent Ng, Latifur Kha...
JMLR
2010
134views more  JMLR 2010»
14 years 6 months ago
Estimation of a Structural Vector Autoregression Model Using Non-Gaussianity
Analysis of causal effects between continuous-valued variables typically uses either autoregressive models or structural equation models with instantaneous effects. Estimation of ...
Aapo Hyvärinen, Kun Zhang, Shohei Shimizu, Pa...
SIGMETRICS
2010
ACM
129views Hardware» more  SIGMETRICS 2010»
14 years 6 months ago
From traffic matrix to routing matrix: PoP level traffic characteristics for a Tier-1 ISP
Traffic matrices play a pivotal role in the management of an ISP's network such as various levels of traffic engineering and capacity planning. However, it is unclear how the...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
GECCO
2011
Springer
256views Optimization» more  GECCO 2011»
14 years 3 months ago
Evolving complete robots with CPPN-NEAT: the utility of recurrent connections
This paper extends prior work using Compositional Pattern Producing Networks (CPPNs) as a generative encoding for the purpose of simultaneously evolving robot morphology and contr...
Joshua E. Auerbach, Josh C. Bongard
IACR
2011
147views more  IACR 2011»
13 years 11 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao