Sciweavers

59 search results - page 11 / 12
» Investigating Two Different Approaches for Encrypted Traffic...
Sort
View
JMLR
2006
147views more  JMLR 2006»
13 years 7 months ago
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously growing spam phenomenon. Current server-side anti-spam ...
Giorgio Fumera, Ignazio Pillai, Fabio Roli
SIAMSC
2008
118views more  SIAMSC 2008»
13 years 6 months ago
Splitting Methods Based on Algebraic Factorization for Fluid-Structure Interaction
We discuss in this paper the numerical approximation of fluid-structure interaction (FSI) problems dealing with strong added-mass effect. We propose new semi-implicit algorithms ba...
Santiago Badia, Annalisa Quaini, Alfio Quarteroni
ASIAN
1998
Springer
118views Algorithms» more  ASIAN 1998»
13 years 11 months ago
Bisimulation Lattice of Chi Processes
Chi calculus was proposed as a process algebra that has a uniform treatment of names. The paper carries out a systematic study of bisimilarities for chi processes. The notion of L-...
Yuxi Fu
CHI
2007
ACM
14 years 7 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
AIR
2004
113views more  AIR 2004»
13 years 6 months ago
Class Noise vs. Attribute Noise: A Quantitative Study
Real-world data is never perfect and can often suffer from corruptions (noise) that may impact interpretations of the data, models created from the data and decisions made based on...
Xingquan Zhu, Xindong Wu