Sciweavers

836 search results - page 124 / 168
» Adaptive independence samplers
Sort
View
NSDI
2008
13 years 11 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
ATAL
2008
Springer
13 years 10 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
AUSDM
2008
Springer
258views Data Mining» more  AUSDM 2008»
13 years 10 months ago
wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability
Accurate and less invasive personalized predictive medicine can spare many breast cancer patients from receiving complex surgical biopsies, unnecessary adjuvant treatments and its...
Umer Khan, Hyunjung Shin, Jongpill Choi, Minkoo Ki...
ICALP
2010
Springer
13 years 10 months ago
Covering and Packing in Linear Space
Abstract. Given a family of subsets of an n-element universe, the kcover problem asks whether there are k sets in the family whose union contains the universe; in the k-packing pro...
Andreas Björklund, Thore Husfeldt, Petteri Ka...
DGCI
2008
Springer
13 years 10 months ago
Statistical Template Matching under Geometric Transformations
Abstract. We present a novel template matching framework for detecting geometrically transformed objects. A template is a simplified representation of the object of interest by a s...
Alexander Sibiryakov