Sciweavers

1909 search results - page 215 / 382
» Generalized Filtering Decomposition
Sort
View
WWW
2006
ACM
16 years 3 months ago
Detecting semantic cloaking on the web
By supplying different versions of a web page to search engines and to browsers, a content provider attempts to cloak the real content from the view of the search engine. Semantic...
Baoning Wu, Brian D. Davison
107
Voted
WWW
2006
ACM
16 years 3 months ago
Using web browser interactions to predict task
The automatic identification of a user's task has the potential to improve information filtering systems that rely on implicit measures of interest and whose effectiveness ma...
Melanie Kellar, Carolyn R. Watters
105
Voted
WWW
2005
ACM
16 years 3 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...
WWW
2004
ACM
16 years 3 months ago
The web around the corner: augmenting the browser with gps
As programmable mobile devices (such as high-end cellular phones and Personal Digital Assistants) became widely adopted, users ask for Internet access on-the-road. While upcoming ...
Davide Carboni, Andrea Piras, Stefano Sanna, Sylva...
102
Voted
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
16 years 2 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek