Sciweavers

2490 search results - page 418 / 498
» A General Method for Feature Matching and Model Extraction
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 24 days ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
WWW
2004
ACM
14 years 9 months ago
Ranking the web frontier
The celebrated PageRank algorithm has proved to be a very effective paradigm for ranking results of web search algorithms. In this paper we refine this basic paradigm to take into...
Nadav Eiron, Kevin S. McCurley, John A. Tomlin
ICTAI
2010
IEEE
13 years 6 months ago
Comparing Approaches to Preference Dominance for Conversational Recommenders
A conversational recommender system iteratively shows a small set of options for its user to choose between. In order to select these options, the system may analyze the queries tr...
Walid Trabelsi, Nic Wilson, Derek G. Bridge, Franc...
WWW
2006
ACM
14 years 9 months ago
Automatic geotagging of Russian web sites
The poster describes a fast, simple, yet accurate method to associate large amounts of web resources stored in a search engine database with geographic locations. The method uses ...
Alexei Pyalling, Michael Maslov, Pavel Braslavski
AES
2005
Springer
105views Cryptology» more  AES 2005»
13 years 8 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera