Sciweavers

160 search results - page 29 / 32
» re 2007
Sort
View
ECRIME
2007
13 years 11 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
CSREAEEE
2006
145views Business» more  CSREAEEE 2006»
13 years 9 months ago
e-Business Systems: Exploring Knowledge Prospect Domains (KPDs)
Research was conducted in the area of sustainable knowledge extraction from e-business systems and technologies. Differentiating approaches from three notable authors in the field...
Daniel Botha
NIPS
2001
13 years 8 months ago
Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering
Drawing on the correspondence between the graph Laplacian, the Laplace-Beltrami operator on a manifold, and the connections to the heat equation, we propose a geometrically motiva...
Mikhail Belkin, Partha Niyogi
IJCAI
1997
13 years 8 months ago
Change, Change, Change: Three Approaches
We consider the frame problem, that is, char­ acterizing the assumption that properties tend to persist over time. We show that there are at least three distinct assumptions that...
Tom Costello
IJCAI
1997
13 years 8 months ago
Combining Probabilistic Population Codes
We study the problemof statisticallycorrect inference in networks whose basic representations are population codes. Population codes are ubiquitous in the brain, and involve the s...
Richard S. Zemel, Peter Dayan