Sciweavers

154 search results - page 11 / 31
» Spam Construction Trends
Sort
View
SOUPS
2006
ACM
14 years 1 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
CISS
2008
IEEE
13 years 9 months ago
Portfolio diversification using subspace factorizations
Abstract-- Successful investment management relies on allocating assets so as to beat the stock market. Asset classes are affected by different market dynamics or latent trends. Th...
Ruairi de Frein, Konstantinos Drakakis, Scott Rick...
CAS
2008
68views more  CAS 2008»
13 years 7 months ago
Very Strongly Constrained Problems: an Ant Colony Optimization Approach
: Ant Colony Optimization (ACO) is a class of metaheuristic algorithms sharing the common approach of constructing a solution on the basis of information provided both by a standar...
Vittorio Maniezzo, Matteo Roffilli
IIE
2006
74views more  IIE 2006»
13 years 7 months ago
Guidelines on the Design of Effective CBL Environments
This paper summarizes two studies and the contemporary literature on the design and construction of effective and efficient Computer Based Learning (CBL) environments. There is ade...
Athanasis Karoulis
KDD
1995
ACM
99views Data Mining» more  KDD 1995»
13 years 11 months ago
Active Data Mining
We introduce an active data mining paradigm that combines the recent work in data mining with the rich literature on active database systems. In this paradigm, data is continuousl...
Rakesh Agrawal, Giuseppe Psaila