Sciweavers

263 search results - page 44 / 53
» Toward best-effort information extraction
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
Cyber-Fraud is One Typo Away
Abstract— Spelling errors when typing a URL can be exploited by website-squatters: users are led to phony sites in a phenomenon we call parasitic URL naming. These phony sites im...
Anirban Banerjee, Dhiman Barman, Michalis Faloutso...
KES
2007
Springer
14 years 4 months ago
Predictive and Contextual Feature Separation for Bayesian Metanetworks
Bayesian Networks are proven to be a comprehensive model to describe causal relationships among domain attributes with probabilistic measure of conditional dependency. However, dep...
Vagan Y. Terziyan
SIGIR
2006
ACM
14 years 4 months ago
Feature diversity in cluster ensembles for robust document clustering
The performance of document clustering systems depends on employing optimal text representations, which are not only difficult to determine beforehand, but also may vary from one ...
Xavier Sevillano, Germán Cobo, Francesc Al&...
ICANN
2005
Springer
14 years 3 months ago
New Ears for a Robot Cricket
Cricket females perform phonotaxis towards the specific sounds produced by male crickets. By means of a well-tuned peripheral auditory system the cricket is able to extract direct...
Ben Torben-Nielsen, Barbara Webb, Richard E. Reeve
ESORICS
2008
Springer
13 years 12 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...