Sciweavers

680 search results - page 122 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
PLDI
2004
ACM
14 years 28 days ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
CIT
2006
Springer
13 years 11 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
CIKM
2008
Springer
13 years 9 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
DGO
2008
126views Education» more  DGO 2008»
13 years 9 months ago
Active learning for e-rulemaking: public comment categorization
We address the e-rulemaking problem of reducing the manual labor required to analyze public comment sets. In current and previous work, for example, text categorization techniques...
Stephen Purpura, Claire Cardie, Jesse Simons