Sciweavers

2631 search results - page 109 / 527
» Less is More
Sort
View
MKTSCI
2011
354views Multimedia» more  MKTSCI 2011»
13 years 1 months ago
Online Display Advertising: Targeting and Obtrusiveness
We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing a...
Avi Goldfarb, Catherine Tucker
IACR
2011
166views more  IACR 2011»
12 years 10 months ago
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a powerful method of differential cryptanalysis. The ne...
Dmitry Khovratovich, Christian Rechberger, Alexand...
WWW
2008
ACM
14 years 11 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
KDD
2001
ACM
164views Data Mining» more  KDD 2001»
14 years 10 months ago
Data mining criteria for tree-based regression and classification
This paper is concerned with the construction of regression and classification trees that are more adapted to data mining applications than conventional trees. To this end, we pro...
Andreas Buja, Yung-Seop Lee
GECCO
2008
Springer
145views Optimization» more  GECCO 2008»
13 years 11 months ago
Memory with memory: soft assignment in genetic programming
Based in part on observations about the incremental nature of most state changes in biological systems, we introduce the idea of Memory with Memory in Genetic Programming (GP), wh...
Nicholas Freitag McPhee, Riccardo Poli