Sciweavers

1629 search results - page 308 / 326
» A Study of Malcode-Bearing Documents
Sort
View
NIPS
2008
13 years 9 months ago
Global Ranking Using Continuous Conditional Random Fields
This paper studies global ranking problem by learning to rank methods. Conventional learning to rank methods are usually designed for `local ranking', in the sense that the r...
Tao Qin, Tie-Yan Liu, Xu-Dong Zhang, De-Sheng Wang...
MEDINFO
2007
13 years 9 months ago
Text Categorization Models for Identifying Unproven Cancer Treatments on the Web
The nature of the internet as a non-peer-reviewed (and more generally largely unregulated) publication medium has allowed wide-spread promotion of inaccurate and unproven medical ...
Yin Aphinyanaphongs, Constantin F. Aliferis
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 9 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
GRAPHICSINTERFACE
2004
13 years 9 months ago
Revisiting Display Space Management: Understanding Current Practice to Inform Next-generation Design
Most modern computer systems allow the user to control the space allocated to interfaces through a window system. While much of the understanding of how people interact with windo...
Dugald Ralph Hutchings, John T. Stasko
IADIS
2004
13 years 9 months ago
A Scheme for Approximate Matching Event Announcements to a Customer Database
An event is a short and data-rich document and it refers to an instance of an announcement type such as "wedding", "birth", "graduation", "aucti...
Ray R. Hashemi, John R. Talburt