Sciweavers

4234 search results - page 569 / 847
» A Method for Web Information Extraction
Sort
View
USS
2008
15 years 6 months ago
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits
Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...
Marco Cova, Christopher Kruegel, Giovanni Vigna
CIKM
2009
Springer
15 years 9 months ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
PAAPP
2007
109views more  PAAPP 2007»
15 years 3 months ago
Relation rule mining
\Web users are nowadays confronted with the huge variety of available information sources whose content is not targeted at any specific group or layer. Recommendation systems aim...
Mehdi Adda, Rokia Missaoui, Petko Valtchev
TMI
2010
122views more  TMI 2010»
15 years 2 months ago
Feature Based Nonrigid Brain MR Image Registration With Symmetric Alpha Stable Filters
—A new feature based nonrigid image registration method for magnetic resonance (MR) brain images is presented in this paper. Each image voxel is represented by a rotation invaria...
Shu Liao, Albert C. S. Chung
ADBIS
2003
Springer
108views Database» more  ADBIS 2003»
15 years 9 months ago
Dynamic Integration of Classifiers in the Space of Principal Components
Recent research has shown the integration of multiple classifiers to be one of the most important directions in machine learning and data mining. It was shown that, for an ensemble...
Alexey Tsymbal, Mykola Pechenizkiy, Seppo Puuronen...