Sciweavers

2623 search results - page 359 / 525
» tools 2010
Sort
View

Publication
148views
14 years 5 days ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
ASUNAM
2010
IEEE
13 years 12 months ago
Leveraging Contextual Information to Explore Posting and Linking Behaviors of Bloggers
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...
Sofus A. Macskassy
AAAI
2010
13 years 12 months ago
Facilitating the Evaluation of Automated Negotiators using Peer Designed Agents
Computer agents are increasingly deployed in settings in which they make decisions with people, such as electronic commerce, collaborative interfaces, and cognitive assistants. Ho...
Raz Lin, Sarit Kraus, Yinon Oshrat, Ya'akov (Kobi)...
AAAI
2010
13 years 12 months ago
Constraint Programming for Data Mining and Machine Learning
Machine learning and data mining have become aware that using constraints when learning patterns and rules can be very useful. To this end, a large number of special purpose syste...
Luc De Raedt, Tias Guns, Siegfried Nijssen
AAAI
2010
13 years 12 months ago
Understanding the Success of Perfect Information Monte Carlo Sampling in Game Tree Search
Perfect Information Monte Carlo (PIMC) search is a practical technique for playing imperfect information games that are too large to be optimally solved. Although PIMC search has ...
Jeffrey Richard Long, Nathan R. Sturtevant, Michae...