-
2
-
-
55949110596
-
Cybergate: A design framework and system for text analysis of computer-mediated communication
-
Abbasi, A., and Chen, H. 2008a. "CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication,"MIS Quarterly (32:4), pp. 811-837.
-
(2008)
MIS Quarterly
, vol.32
, Issue.4
, pp. 811-837
-
-
Abbasi, A.1
Chen, H.2
-
3
-
-
42049084142
-
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
-
Article 7.
-
Abbasi, A., and Chen, H. 2008b. "Writeprints: A Stylometric Approach to Identity-level Identification and Similarity Detection in Cyberspace," ACM Transactions on Information Systems (26:2), Article 7.
-
(2008)
ACM Transactions on Information Systems
, vol.26
, Issue.2
-
-
Abbasi, A.1
Chen, H.2
-
4
-
-
49049110756
-
Stylometric identification in electronic markets: Scalability and robustness
-
Abbasi, A., Chen, H., and Nunamaker Jr., J. F. 2008. "Stylometric Identification in Electronic Markets: Scalability and Robustness," Journal of Management Information Systems (25:1), pp. 49-79.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.1
, pp. 49-79
-
-
Abbasi, A.1
Chen, H.2
Nunamaker Jr., J.F.3
-
5
-
-
42049122994
-
Data mining challenges for electronic safety: The case of fraudulent intent detection in E-mails
-
Los Alamitos, CA: IEEE Computer Society
-
Airoldi, E., and Malin, B. 2004. "Data Mining Challenges for Electronic Safety: The Case of Fraudulent Intent Detection in E-Mails," in Proceedings of the Workshop on Privacy and Security Aspects of Data Mining, Los Alamitos, CA: IEEE Computer Society, pp. 57-66.
-
(2004)
Proceedings of the Workshop on Privacy and Security Aspects of Data Mining
, pp. 57-66
-
-
Airoldi, E.1
Malin, B.2
-
6
-
-
34548392598
-
Enhancing information retrieval through statistical natural language processing: A study of collocation indexing
-
Arazy, O., and Woo, C. 2007. "Enhancing Information Retrieval Through Statistical Natural Language Processing: A Study of Collocation Indexing,"MIS Quarterly (31:3), pp. 525-546.
-
(2007)
MIS Quarterly
, vol.31
, Issue.3
, pp. 525-546
-
-
Arazy, O.1
Woo, C.2
-
7
-
-
0002096055
-
Studies in the history of probability and statistics: XI. Thomas bayes' essay towards solving a problem in the doctrine of chances
-
Bayes, T. 1958. "Studies in the History of Probability and Statistics: XI. Thomas Bayes' Essay Towards Solving a Problem in the Doctrine of Chances," Biometrika (45), pp. 293-295.
-
(1958)
Biometrika
, vol.45
, pp. 293-295
-
-
Bayes, T.1
-
8
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Burges, C. J. C. 1998. "A Tutorial on Support Vector Machines for Pattern Recognition," Data Mining and Knowledge Discovery (2), pp. 121-167.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
9
-
-
33645316810
-
Link-based similarity measures for the classification of web documents
-
Calado, P., Cristo, M., Goncalves, M. A., de Moura, E. S., Ribeiro-Neto, B., and Ziviani, N. 2006. "Link-Based Similarity Measures for the Classification of Web Documents," Journal of the American Society for Information Science and Technology (57:2), pp. 208-221.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.2
, pp. 208-221
-
-
Calado, P.1
Cristo, M.2
Goncalves, M.A.3
De Moura, E.S.4
Ribeiro-Neto, B.5
Ziviani, N.6
-
10
-
-
84863268449
-
Dynamic support vector machines for non-stationary time series forecasting
-
Cao, L., and Gu, Q. 2002. "Dynamic Support Vector Machines for Non-Stationary Time Series Forecasting," Intelligent Data Analysis (6:1), pp. 67-83.
-
(2002)
Intelligent Data Analysis
, vol.6
, Issue.1
, pp. 67-83
-
-
Cao, L.1
Gu, Q.2
-
11
-
-
24644515417
-
Kernel machine-based one-parameter regularized fisher discriminant method for face recognition
-
DOI 10.1109/TSMCB.2005.844596
-
Chen, W. S., Yuen, P. C., Huang, J., and Dai, D. Q. 2005. "Kernel Machine-Based One-Parameter Regularized Fisher Discriminant Method for Face Recognition," IEEE Transactions on Systems Man and Cybernetics Part B (35:4), pp. 659-669. (Pubitemid 41655573)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.4
, pp. 659-669
-
-
Chen, W.-S.1
Yuen, P.C.2
Huang, J.3
Dai, D.-Q.4
-
13
-
-
7244245467
-
Fighting internet auction fraud: An assessment and proposal
-
Chua, C. E. H., and Wareham, J. 2004. "Fighting Internet Auction Fraud: An Assessment and Proposal," IEEE Computer (37:10), pp. 31-37.
-
(2004)
IEEE Computer
, vol.37
, Issue.10
, pp. 31-37
-
-
Chua, C.E.H.1
Wareham, J.2
-
14
-
-
38549173255
-
The role of online trading communities in managing internet auction fraud
-
Chua, C. E. H., Wareham, J., and Robey, D. 2007. "The Role of Online Trading Communities in Managing Internet Auction Fraud," MIS Quarterly (31:4), pp. 759-781.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 759-781
-
-
Chua, C.E.H.1
Wareham, J.2
Robey, D.3
-
16
-
-
44249094423
-
Modeling web site design across cultures: Relationships to trust, satisfaction, and e-loyalty
-
Cyr, D. 2008. "Modeling Web Site Design Across Cultures: Relationships to Trust, Satisfaction, and E-Loyalty," Journal of Management Information Systems (24:4), pp. 47-72.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 47-72
-
-
Cyr, D.1
-
17
-
-
33749551929
-
-
Dinev, T. 2006. "Why Spoofing is Serious Internet Fraud," Communications of the ACM (49:10), pp. 76-82.
-
(2006)
Communications of the ACM
, vol.49
, Issue.10
, pp. 76-82
-
-
Dinev, T.1
-
20
-
-
85105809948
-
Inductive learning algorithms and representations for text categorization
-
Bethesda, MD, November 2-7
-
Dumais, S., Platt, J., Heckerman, D., and Sahami, M. 1998. "Inductive Learning Algorithms and Representations for Text Categorization," in Proceedings of the Seventh of ACM Conference on Information and Knowledge Management, Bethesda, MD, November 2-7, pp. 148-155.
-
(1998)
Proceedings of the Seventh of ACM Conference on Information and Knowledge Management
, pp. 148-155
-
-
Dumais, S.1
Platt, J.2
Heckerman, D.3
Sahami, M.4
-
21
-
-
33748583750
-
How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store
-
Everard, A. P., and Galletta, D. F. 2005. "How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store," Journal of Management Information Systems (22:3), pp. 56-95.
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.3
, pp. 56-95
-
-
Everard, A.P.1
Galletta, D.F.2
-
22
-
-
77954428596
-
Spam, damn spam, and statistics
-
Pais, June 17-18
-
Fetterly, D., Manasse, M., and Najork, M. 2004. "Spam, Damn Spam, and Statistics," in Proceedings of the Seventh International Workshop on the Web and Databases, Pais, June 17-18, pp. 1-6.
-
(2004)
Proceedings of the Seventh International Workshop on the Web and Databases
, pp. 1-6
-
-
Fetterly, D.1
Manasse, M.2
Najork, M.3
-
23
-
-
2942731012
-
An extensive empirical study of feature selection metrics for text classification
-
Forman, G. 2003. "An Extensive Empirical Study of Feature Selection Metrics for Text Classification," Journal of Machine Learning Research (3), pp. 1289-1305.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 1289-1305
-
-
Forman, G.1
-
24
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on earth mover's distance
-
Fu, A. Y., Liu, W., and Deng, X. 2006. "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)," IEEE Transactions on Dependable and Secure Computing (3:4), pp. 301-311.
-
(2006)
IEEE Transactions on Dependable and Secure Computing (3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Liu, W.2
Deng, X.3
-
25
-
-
15044354915
-
Managing user trust in B2C e-services
-
Gefen, D., and Straub, D. 2003. "Managing User Trust in B2C e-Services," eService Journal (2:2), pp. 7-24.
-
(2003)
EService Journal
, vol.2
, Issue.2
, pp. 7-24
-
-
Gefen, D.1
Straub, D.2
-
26
-
-
0034226904
-
Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
-
Grazioli, S., and Jarvenpaa, S. L. 2000. "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man, and Cybernetics Part A (20:4), pp. 395-410.
-
(2000)
IEEE Transactions on Systems Man and Cybernetics Part A
, vol.20
, Issue.4
, pp. 395-410
-
-
Grazioli, S.1
Jarvenpaa, S.L.2
-
27
-
-
33745561205
-
An introduction to variable and feature selection
-
Guyon, I., and Elisseeff, A. 2003. "An Introduction to Variable and Feature Selection," Journal of Machine Learning Research (3), pp. 1157-1182.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 1157-1182
-
-
Guyon, I.1
Elisseeff, A.2
-
28
-
-
27344439205
-
Spam: It's not just for inboxes anymore
-
Gyongyi, Z., and Garcia-Molina, H. 2005. "Spam: It's Not Just for Inboxes Anymore," IEEE Computer (38:10), pp. 28-34.
-
(2005)
IEEE Computer
, vol.38
, Issue.10
, pp. 28-34
-
-
Gyongyi, Z.1
Garcia-Molina, H.2
-
29
-
-
77957089806
-
Nettrust-Recommendation system for embedding trust in a virtual realm
-
Minneapolis, MN.
-
Hariharan, P., Asgharpour, F., and Camp, L. J. 2007. "NetTrust- Recommendation System for Embedding Trust in a Virtual Realm," in Proceedings of the ACM Conference on Recommender Systems, Minneapolis, MN.
-
(2007)
Proceedings of the ACM Conference on Recommender Systems
-
-
Hariharan, P.1
Asgharpour, F.2
Camp, L.J.3
-
30
-
-
0242652022
-
Design science in information systems research
-
Hevner, A. R., March, S. T., Park, J., and Ram, S. 2004. "Design Science in Information Systems Research," MIS Quarterly (28:1), pp. 75-105.
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 75-105
-
-
Hevner, A.R.1
March, S.T.2
Park, J.3
Ram, S.4
-
31
-
-
77957082458
-
Trends in cybercrime: The darkside of the internet
-
Hoar, S. B. 2005. "Trends in Cybercrime: The Darkside of the Internet," Criminal Justice (20:3), pp. 4-13.
-
(2005)
Criminal Justice
, vol.20
, Issue.3
, pp. 4-13
-
-
Hoar, S.B.1
-
32
-
-
34848911641
-
Social phishing
-
Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. 2007. "Social Phishing," Communications of the ACM (50:10), pp. 94-100.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
34
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jesang, A., Ismail, R., and Boyd, C. 2007. "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems (43:2), pp. 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jesang, A.1
Ismail, R.2
Boyd, C.3
-
35
-
-
33747174227
-
-
Baltimore County, MD.
-
Kolari, P., Finin, T., and Joshi, A. 2006. "SVMs for the Blogosphere: Blog Identification and Splog Detection," in AAAI Spring Symposium on Computational Approaches to Analyzing Weblogs, Baltimore County, MD.
-
(2006)
AAAI Spring Symposium on Computational Approaches to Analyzing Weblogs
-
-
Kolari, P.1
Finin, T.2
Joshi, A.3
-
36
-
-
0036015968
-
Applying the technology acceptance model and flow theory to online consumer behavior
-
Koufaris, M. 2002. "Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior," Information Systems Research (13:2), pp. 205-223.
-
(2002)
Information Systems Research
, vol.13
, Issue.2
, pp. 205-223
-
-
Koufaris, M.1
-
37
-
-
0030653064
-
Authorship analysis: Identifying the author of a program
-
Krsul, I., and Spafford, H. E. 1997. "Authorship Analysis: Identifying the Author of a Program," Computer Security (16:3), pp. 233-257.
-
(1997)
Computer Security
, vol.16
, Issue.3
, pp. 233-257
-
-
Krsul, I.1
Spafford, H.E.2
-
38
-
-
2342532313
-
Criminals become tech savvy
-
Levy, E. 2004. "Criminals Become Tech Savvy," IEEE Security and Privacy (2:2), pp. 65-68.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.2
, pp. 65-68
-
-
Levy, E.1
-
39
-
-
34249853668
-
Usability evaluation of anti-phishing toolbars
-
Li, L., and Helenius, M. 2007. "Usability Evaluation of Anti-Phishing Toolbars," Journal in Computer Virology (3:2), pp. 163-184.
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.2
, pp. 163-184
-
-
Li, L.1
Helenius, M.2
-
40
-
-
34250091945
-
Learning quickly when irrelevantattributes are abound: A new linear threshold algorithm
-
Littlestone, N. 1988. "Learning Quickly When IrrelevantAttributes are Abound: A New Linear Threshold Algorithm," Machine Learning (2), pp. 285-318.
-
(1988)
Machine Learning
, vol.2
, pp. 285-318
-
-
Littlestone, N.1
-
41
-
-
33645131523
-
An anti-phishing strategy based on visual similarity assessment
-
Liu, W., Deng, X., Huang, G., and Fu, A. Y. 2006. "An Anti-phishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing (10:2), pp. 58-65.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Deng, X.2
Huang, G.3
Fu, A.Y.4
-
42
-
-
0041965869
-
Text classification using string kernels
-
Lodhi, H., Saunders, C., Shawe-Taylor, J., Cristianini, N., and Watkins, C. 2002. "Text Classification Using String Kernels," Journal of Machine Learning Research (2:3), pp. 419-444.
-
(2002)
Journal of Machine Learning Research
, vol.2
, Issue.3
, pp. 419-444
-
-
Lodhi, H.1
Saunders, C.2
Shawe-Taylor, J.3
Cristianini, N.4
Watkins, C.5
-
43
-
-
44249091185
-
Explaining and predicting the impact of brand alliances and web site quality on initial consumer trust of E-commerce web sites
-
Lowry, P. B., Vance, A., Moody, G., Beckman, B., and Read, A. 2008. "Explaining and Predicting the Impact of Brand Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites," Journal of Management Information Systems (24:4), pp. 199-224.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 199-224
-
-
Lowry, P.B.1
Vance, A.2
Moody, G.3
Beckman, B.4
Read, A.5
-
45
-
-
13244298307
-
Internet Users' Information Privacy Concern (IUIPC): The construct, the scale, and a causal model
-
Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concern (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research (15:4), pp. 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
46
-
-
0029537737
-
Design and natural science research on information technology
-
March, S. T., and Smith, G. 1995. "Design and Natural Science Research on Information Technology," Decision Support Systems (15:4), pp. 251-266.
-
(1995)
Decision Support Systems
, vol.15
, Issue.4
, pp. 251-266
-
-
March, S.T.1
Smith, G.2
-
47
-
-
0012741362
-
A design theory for systems that support emergent knowledge processes
-
Markus, M. L., Majchrzak, A., and Gasser, L. 2002. "A Design Theory for Systems that Support Emergent Knowledge Processes," MIS Quarterly (26:3), pp. 179-212.
-
(2002)
MIS Quarterly
, vol.26
, Issue.3
, pp. 179-212
-
-
Markus, M.L.1
Majchrzak, A.2
Gasser, L.3
-
48
-
-
77957033680
-
FTC, businesses renewing fight against ID theft
-
September 3.
-
McGuire, D. 2003. "FTC, Businesses Renewing Fight Against ID Theft," Washington Post, September 3.
-
(2003)
Washington Post
-
-
McGuire, D.1
-
49
-
-
0036737236
-
Developing and validating trust measures for E-commerce
-
McKnight, D. H., Choudhury, V., and Kacmar, C. 2002. "Developing and Validating Trust Measures for E-commerce," Information Systems Research (13:3), pp. 334-359.
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 334-359
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
50
-
-
0242288813
-
The support vector machine under test
-
Meyer, D., Leisch, F., and Hornik, K. 2003. "The Support Vector Machine Under Test," Neurocomputing (55:1-2), pp. 169-186.
-
(2003)
Neurocomputing
, vol.55
, Issue.1-2
, pp. 169-186
-
-
Meyer, D.1
Leisch, F.2
Hornik, K.3
-
51
-
-
0035272287
-
An introduction to kernel-based learning algorithms
-
Muller, K., Mika, Sebastian, M., Ratsch, G., Tsuda, K., and Scholkopf, B. 2001. "An Introduction to Kernel-Based Learning Algorithms," IEEE Transactions on Neural Networks (12:2), pp. 181-201.
-
(2001)
IEEE Transactions on Neural Networks
, vol.12
, Issue.2
, pp. 181-201
-
-
Muller, K.1
Mika Sebastian, M.2
Ratsch, G.3
Tsuda, K.4
Scholkopf, B.5
-
52
-
-
34250653315
-
Detecting spam web pages through content analysis
-
Edinburgh, Scotland, May 23-26
-
th International World Wide Web Conference, Edinburgh, Scotland, May 23-26, pp. 83-92.
-
(2006)
th International World Wide Web Conference
, pp. 83-92
-
-
Ntoulas, A.1
Najork, M.2
Manasse, M.3
Fetterly, D.4
-
53
-
-
1242295725
-
Build and learn, evaluate and learn
-
Nunamaker, Jr., J. F. 1992. "Build and Learn, Evaluate and Learn," Informatica (1:1)
-
(1992)
Informatica
, vol.1
, Issue.1
-
-
Nunamaker Jr., J.F.1
-
54
-
-
70449971099
-
Systems development in information systems research
-
Nunamaker, Jr., J. F., Chen, M., and Purdin, T. D. M. 1991. "Systems Development in Information Systems Research," Journal of Management Information Systems (7:3), pp.89-106.
-
(1991)
Journal of Management Information Systems
, vol.7
, Issue.3
, pp. 89-106
-
-
Nunamaker Jr., J.F.1
Chen, M.2
Purdin, T.D.M.3
-
56
-
-
29444459006
-
Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role
-
Pavlou, P. A., and Gefen, D. 2005. "Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role," Information Systems Research (16:4), pp. 372-399.
-
(2005)
Information Systems Research
, vol.16
, Issue.4
, pp. 372-399
-
-
Pavlou, P.A.1
Gefen, D.2
-
57
-
-
33744584654
-
-
Quinlan, R. 1986. "Induction of Decision Trees," Machine Learning (1:1), pp. 81-106.
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, R.1
-
58
-
-
85088336756
-
-
nd ed.) Upper Saddle River, NJ: Prentice Hall.
-
nd ed.), Upper Saddle River, NJ: Prentice Hall.
-
(2003)
-
-
Russell, S.J.1
Norvig, P.2
-
59
-
-
85064266519
-
Weblog classification for fast splog filtering: A URL language model segmentation approach
-
New York, June 4-9
-
Salvetti, F., and Nicolov, N. 2006. "Weblog Classification for Fast Splog Filtering: A URL Language Model Segmentation Approach," in Proceedings of the Human Language Technology Conference, New York, June 4-9, pp. 137-140.
-
(2006)
Proceedings of the Human Language Technology Conference
, pp. 137-140
-
-
Salvetti, F.1
Nicolov, N.2
-
60
-
-
0002442796
-
Machine learning in automated text categorization
-
Sebastiani, F. 2002. "Machine Learning in Automated Text Categorization," ACM Computing Surveys (34:1), pp. 1-47.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
61
-
-
84909160822
-
-
Center for Law, Commerce & Technology, School of Law, University of Washington, April 17.
-
Selis, P., Ramasastry, A., and Wright, C. S. 2001. "Bidder Beware: Toward a Fraud-Free Marketplace-Best Practices for the Online Auction Industry," Center for Law, Commerce & Technology, School of Law, University of Washington, April 17.
-
(2001)
Bidder Beware Toward A Fraud-free Marketplace-Best Practices for the Online Auction Industry
-
-
Selis, P.1
Ramasastry, A.2
Wright, C.S.3
-
62
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C. E. 1948. "A Mathematical Theory of Communication," Bell Systems Technical Journal (27:10), pp. 379-423.
-
(1948)
Bell Systems Technical Journal
, vol.27
, Issue.10
, pp. 379-423
-
-
Shannon, C.E.1
-
64
-
-
79955064984
-
Detecting link spam using temporal information
-
Hong Kong, December 18-22
-
Shen, G., Gao, B., Liu, T. Y., Feng, G., Song, S., and Li, H. 2006. "Detecting Link Spam Using Temporal Information," in Proceedings of the Sixth International Conference on Data Mining, Hong Kong, December 18-22, pp. 1049-1053.
-
(2006)
Proceedings of the Sixth International Conference on Data Mining
, pp. 1049-1053
-
-
Shen, G.1
Gao, B.2
Liu, T.Y.3
Feng, G.4
Song, S.5
Li, H.6
-
67
-
-
13844255022
-
Blocking reduction strategies in hierarchical text classification
-
Sun, A., Lim, E.-P., Ng, W.-K., and Srivastava, J. 2004. "Blocking Reduction Strategies in Hierarchical Text Classification," IEEE Transactions on Knowledge and Data Engineering (16:10), pp. 1305-1308.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1305-1308
-
-
Sun, A.1
Lim, E.-P.2
Ng, W.-K.3
Srivastava, J.4
-
68
-
-
2142643698
-
A support vector machine with a hybrid kernel and minimal vapnik-chervonenkis dimension
-
Tan, Y., and Wang, J. 2004. "A Support Vector Machine with a Hybrid Kernel and Minimal Vapnik-Chervonenkis Dimension," IEEE Transactions on Knowledge and Data Engineering (16:4), pp. 385-395.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 385-395
-
-
Tan, Y.1
Wang, J.2
-
69
-
-
63049134885
-
Tracking web spam with hidden style similarity
-
Seattle, WA, August 10
-
nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), Seattle, WA, August 10, pp. 25-31.
-
(2006)
nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)
, pp. 25-31
-
-
Urvoy, T.1
Lavergne, T.2
Filoche, P.3
-
71
-
-
0032594959
-
An overview of statistical learning theory
-
Vapnik, V. 1999b. "An Overview of Statistical Learning Theory," IEEE Transactions on Neural Networks (10:5), pp. 988-999.
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.5
, pp. 988-999
-
-
Vapnik, V.1
-
72
-
-
0002430582
-
Building an information system design theory for vigilant EIS
-
Walls, J. G., Widmeyer, G. R., and El Sawy, O. A. 1992. "Building an Information System Design Theory for Vigilant EIS," Information Systems Research (3:1), pp. 36-59.
-
(1992)
Information Systems Research
, vol.3
, Issue.1
, pp. 36-59
-
-
Walls, J.G.1
Widmeyer, G.R.2
El Sawy, O.A.3
-
74
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
Montreal, April 22-27
-
Wu, M., Miller, R. C., and Garfunkel, S. L. 2006. "Do Security Toolbars Actually Prevent Phishing Attacks?," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Montreal, April 22-27, pp. 601-610.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfunkel, S.L.3
-
75
-
-
0742268826
-
Pebl: Web page classification without negative examples
-
Yu, H., Han, J., and Chang, K. C.-C. 2004. "PEBL: Web Page Classification without Negative Examples," IEEE Transactions on Knowledge and Data Engineering (16:1), pp. 70-81.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.1
, pp. 70-81
-
-
Yu, H.1
Han, J.2
Chang, K.C.-C.3
-
76
-
-
0142259871
-
Kernel methods for relation extraction
-
Zelenko, D., Aone, C., and Richardella, A. 2003. "Kernel Methods for Relation Extraction," Journal of Machine Learning Research (3:6), pp. 1083-1106.
-
(2003)
Journal of Machine Learning Research
, vol.3
, Issue.6
, pp. 1083-1106
-
-
Zelenko, D.1
Aone, C.2
Richardella, A.3
-
78
-
-
33644552803
-
A framework for authorship analysis of onlinemessages: Writing-stylefeatures and techniques
-
Zheng, R., Li, J., Huang, Z., and Chen, H. 2006. "A Framework for Authorship Analysis of OnlineMessages: Writing-StyleFeatures and Techniques," Journal of the American Society for Information Science and Technology (57:3), pp. 378-393.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.3
, pp. 378-393
-
-
Zheng, R.1
Li, J.2
Huang, Z.3
Chen, H.4
-
79
-
-
30344452268
-
Localization site prediction for membrane proteins by integrating rule and svm classification
-
Zhou, S., and Wang, K. 2005. "Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification," IEEE Transactions on Knowledge and Data Engineering (17:12), pp. 1694-1705.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.12
, pp. 1694-1705
-
-
Zhou, S.1
Wang, K.2
|