Sciweavers

411 search results - page 49 / 83
» Extracting Temporal Information from Short Messages
Sort
View
AIPRF
2008
13 years 8 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
BMCBI
2010
109views more  BMCBI 2010»
13 years 7 months ago
Structural alphabets derived from attractors in conformational space
Background: The hierarchical and partially redundant nature of protein structures justifies the definition of frequently occurring conformations of short fragments as `states'...
Alessandro Pandini, Arianna Fornili, Jens Kleinjun...
JCM
2008
138views more  JCM 2008»
13 years 7 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
ESWS
2007
Springer
14 years 1 months ago
Empowering Moodle with Rules and Semantics
This short paper describes preliminary ideas for empowering e-learning platform Moodle with rules and semantics. Many existing web applications already contain a lot of structured ...
Sergey Lukichev, Ion-Mircea Diaconescu, Adrian Giu...
SPIRE
2007
Springer
14 years 1 months ago
Highly Frequent Terms and Sentence Retrieval
In this paper we propose a novel sentence retrieval method based on extracting highly frequent terms from top retrieved documents. We compare it against state of the art sentence r...
David E. Losada, Ronald T. Fernández