Sciweavers

993 search results - page 193 / 199
» Classification Reliability and Its Use in Multi-classifier S...
Sort
View
ECRIME
2007
13 years 11 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
IUI
1998
ACM
13 years 11 months ago
U-TEL: A Tool for Eliciting User Task Models from Domain Experts
Eliciting user-task models is a thorny problem in modelbased user interface design, and communicating domainspecific knowledge from an expert to a knowledge engineer is a continui...
R. Chung-Man Tam, David Maulsby, Angel R. Puerta
BMCBI
2008
116views more  BMCBI 2008»
13 years 7 months ago
MScanner: a classifier for retrieving Medline citations
Background: Keyword searching through PubMed and other systems is the standard means of retrieving information from Medline. However, ad-hoc retrieval systems do not meet all of t...
Graham L. Poulter, Daniel L. Rubin, Russ B. Altman...
CPHYSICS
2008
96views more  CPHYSICS 2008»
13 years 7 months ago
Moment distributions of clusters and molecules in the adiabatic rotor model
We present a Fortran program to compute the distribution of dipole moments of free particles for use in analyzing molecular beams experiments that measure moments by deflection in...
G. E. Ballentine, G. F. Bertsch, N. Onishi, K. Yab...
HICSS
2006
IEEE
163views Biometrics» more  HICSS 2006»
14 years 1 months ago
Learning Ranking vs. Modeling Relevance
The classical (ad hoc) document retrieval problem has been traditionally approached through ranking according to heuristically developed functions (such as tf.idf or bm25) or gene...
Dmitri Roussinov, Weiguo Fan