Sciweavers

14386 search results - page 2741 / 2878
» The Chinese Generals Problem
Sort
View
ECRIME
2007
14 years 3 days ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ICLP
2010
Springer
14 years 2 days ago
Tight Semantics for Logic Programs
We define the Tight Semantics (TS), a new semantics for all NLPs complying with the requirements of: 2-valued semantics; preserving the models of SM; guarantee of model existence...
Luís Moniz Pereira, Alexandre Miguel Pinto
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
14 years 2 days ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen
KDD
2010
ACM
224views Data Mining» more  KDD 2010»
14 years 2 days ago
Ensemble pruning via individual contribution ordering
An ensemble is a set of learned models that make decisions collectively. Although an ensemble is usually more accurate than a single learner, existing ensemble methods often tend ...
Zhenyu Lu, Xindong Wu, Xingquan Zhu, Josh Bongard
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
14 years 2 days ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
« Prev « First page 2741 / 2878 Last » Next »