This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
Randomized Response techniques have been empirically investigated in privacy preserving association rule mining. However, previous research on privacy preserving market basket data...
- A dynamical neural model that is strongly biologically motivated is applied to learning and retrieving binary patterns. This neural network, known as Freeman’s Ksets, is traine...
In designing Jabberwocky—a speech-based interface to Microsoft PowerPoint—we have tried to go beyond simple commands like “Next slide, please” and make a tool that aids sp...
David Franklin, Shannon Bradshaw, Kristian J. Hamm...
Background: Phylogenetic analysis is emerging as one of the most informative computational methods for the annotation of genes and identification of evolutionary modules of functi...