Sciweavers

1252 search results - page 18 / 251
» Foundations of Similarity and Utility
Sort
View
KES
2000
Springer
13 years 11 months ago
A context based approach to acquisition and utilization of personal knowledge for WWW browsing
: Our personal knowledge plays a vital role in our daily intellectual work. This paper proposes a method for acquiring and utilizing our personal knowledge in computer systems. We ...
Tom Takashiro, Hideaki Takeda
LREC
2010
172views Education» more  LREC 2010»
13 years 9 months ago
Evaluating Utility of Data Sources in a Large Parallel Czech-English Corpus CzEng 0.9
CzEng 0.9 is the third release of a large parallel corpus of Czech and English. For the current release, CzEng was extended by significant amount of texts from various types of so...
Ondrej Bojar, Adam Liska, Zdenek Zabokrtský
ICONIP
2009
13 years 5 months ago
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites
In this paper, we present an approach that aims to study users' past trust decisions (PTDs) for improving the accuracy of detecting phishing sites. Generally, Web users requir...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
CVPR
2007
IEEE
14 years 9 months ago
Utilizing Variational Optimization to Learn Markov Random Fields
Markov Random Field, or MRF, models are a powerful tool for modeling images. While much progress has been made in algorithms for inference in MRFs, learning the parameters of an M...
Marshall F. Tappen
PET
2005
Springer
14 years 1 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey