Sciweavers

997 search results - page 155 / 200
» Completely Lazy Learning
Sort
View
SOUPS
2006
ACM
14 years 3 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little
ACMSE
2005
ACM
14 years 3 months ago
First year experiences of NSF REU grant: emerging issues in computer networking
In this paper, we describe our first year experiences of administering the NSF-supported Research Experiences for Undergraduates program award. Emerging issues in computer network...
Stan Kurkovsky, Bhagyavati
NLDB
2005
Springer
14 years 3 months ago
Combining Data-Driven Systems for Improving Named Entity Recognition
Abstract. The increasing flow of digital information requires the extraction, filtering and classification of pertinent information from large volumes of texts. An important pre...
Zornitsa Kozareva, Óscar Ferrández, ...
DALT
2004
Springer
14 years 3 months ago
The Logic of Communication Graphs
In 1992, Moss and Parikh studied a bimodal logic of knowledge and effort called Topologic. In this current paper, Topologic is extended to the case of many agents who are assumed...
Eric Pacuit, Rohit Parikh
PPSN
2004
Springer
14 years 3 months ago
Credit Assignment Among Neurons in Co-evolving Populations
Different credit assignment strategies are investigated in a two level co-evolutionary model which involves a population of Gaussian neurons and a population of radial basis funct...
Vineet R. Khare, Xin Yao, Bernhard Sendhoff