-
1
-
-
0037907534
-
Toulmins philosophy of argument and its relevance to offender profiling, Psychology
-
Alison, L., Smith, M., Eastman, O. & Rainbow, L. (2003), 'Toulmins philosophy of argument and its relevance to offender profiling', Psychology, Crime and Law 9(2), pp. 173-183.
-
(2003)
Crime and Law
, vol.9
, Issue.2
, pp. 173-183
-
-
Alison, L.1
Smith, M.2
Eastman, O.3
Rainbow, L.4
-
2
-
-
67650694553
-
Modified global k-means algorithm for clustering in gene expression data sets
-
Hobart, Australia. CRPIT
-
Bagirov, A.M. & Mardaneh, K. (2006), Modified global k-means algorithm for clustering in gene expression data sets. In Proc. 2006 Workshop on Intelligent Systems for Bioinformatics (WISB 2006), vol. 73, Hobart, Australia. CRPIT.
-
(2006)
Proc. 2006 Workshop on Intelligent Systems for Bioinformatics (WISB 2006)
, vol.73
-
-
Bagirov, A.M.1
Mardaneh, K.2
-
3
-
-
45549104169
-
Modified global k-means algorithm for minimum sum-of-squares clustering problems
-
(Oct. 2008)
-
Bagirov, A. M. (2008), Modified global k-means algorithm for minimum sum-of-squares clustering problems, Pattern Recogn, 41, 10 (Oct. 2008), pp. 3192- 3199.
-
(2008)
Pattern Recogn
, vol.41
, Issue.10
, pp. 3192-3199
-
-
Bagirov, A.M.1
-
4
-
-
26844576391
-
A new nonsmooth optimization algorithm for minimum sum-of-squares clustering problems
-
Bagirov, A.M. & Yearwood, J. (2006), A new nonsmooth optimization algorithm for minimum sum-of-squares clustering problems. European Journal of Operatioanl Research, vol. 170 pp. 578-596.
-
(2006)
European Journal of Operatioanl Research
, vol.170
, pp. 578-596
-
-
Bagirov, A.M.1
Yearwood, J.2
-
7
-
-
84870548992
-
Prototyping a lightweight trust architecture to fight phishing, Technical report
-
Final Report, URL
-
Chau, D. (2005), Prototyping a lightweight trust architecture to fight phishing, Technical report, MIT ComputerScience And Artificial Intelligence Laboratory. Final Report, URL: http://groups.csail.mit.edu/cis/crypto/projects/antiphishing/
-
(2005)
MIT ComputerScience And Artificial Intelligence Laboratory
-
-
Chau, D.1
-
8
-
-
0005044188
-
Profiling: A hidden challenge to the regulation of data surveillance
-
Clark, R. (1993), Profiling: A hidden challenge to the regulation of data surveillance, Journal of Law and Information Science 4,2.
-
(1993)
Journal of Law and Information Science
, vol.4
, pp. 2
-
-
Clark, R.1
-
11
-
-
14344258244
-
Solving cluster ensemble problems by bipartite graph partitioning
-
(Banff, Alberta, Canada, July 04-08, 2004). ICML '04, ACM, New York, NY
-
Fern, X. Z. & Brodley C. E. (2004), Solving cluster ensemble problems by bipartite graph partitioning, In Proceedings of the Twenty-First international Conference on Machine Learning (Banff, Alberta, Canada, July 04 - 08, 2004). ICML '04, Vol. 69. ACM, New York, NY, p. 36.
-
(2004)
Proceedings of the Twenty-First international Conference on Machine Learning
, vol.69
, pp. 36
-
-
Fern, X.Z.1
Brodley, C.E.2
-
12
-
-
35348913799
-
Learning to detect phishing emails
-
ACM Press, New York, NY, USA
-
Fette, I., Sadeh, N. & Tomasic, A. (2007), Learning to detect phishing emails, in WWW 07: Proceedings of the 16th international conference on WorldWide Web, ACM Press, New York, NY, USA, pp. 649- 656.
-
(2007)
WWW 07: Proceedings of the 16th international conference on WorldWide Web
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
14
-
-
2542498498
-
-
Kluwer Academic Publishers, Norwell, MA, USA
-
Thorsten, J. (2002), Learning to classify text using support vector machines: methods, theory and algorithms, Kluwer Academic Publishers, Norwell, MA, USA.
-
(2002)
Learning to classify text using support vector machines: methods, theory and algorithms
-
-
Thorsten, J.1
-
16
-
-
33751030004
-
Cache cookies for browser authentication (extended abstract)
-
IEEE Computer Society, Washington, DC, USA
-
Juels, A., Jakobsson M. & Jagatic, T. N. (2006), Cache cookies for browser authentication (extended abstract), in SP 06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P06), IEEE Computer Society, Washington, DC, USA, pp. 301-305.
-
(2006)
SP 06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P06)
, pp. 301-305
-
-
Juels, A.1
Jakobsson, M.2
Jagatic, T.N.3
-
20
-
-
0003734628
-
-
Technical report, University of Minnesota, Department of Computer Science and Engineering, Army HPC Research Centre, Minneapolis
-
Karypis, G. & Kumar, V. (1998), METIS: A software package for partitioning unstructured graphs, partitioning meshes, and computing fillreducing orderings of sparse matrices, Technical report, University of Minnesota, Department of Computer Science and Engineering, Army HPC Research Centre, Minneapolis.
-
(1998)
METIS: A software package for partitioning unstructured graphs, partitioning meshes, and computing fillreducing orderings of sparse matrices
-
-
Karypis, G.1
Kumar, V.2
-
22
-
-
0041965980
-
Cluster ensembles - A knowledge reuse framework for combining multiple partitions
-
Strehl, A. & Ghosh, J. (2002), 'Cluster ensembles - A knowledge reuse framework for combining multiple partitions', Journal of Machine Learning Research 3, pp. 583-617.
-
(2002)
Journal of Machine Learning Research
, vol.3
, pp. 583-617
-
-
Strehl, A.1
Ghosh, J.2
-
24
-
-
0005044188
-
Profiling: A Hidden Challenge to the regulation of Data Surveillance
-
Roger, C. (1993), 'Profiling: A Hidden Challenge to the regulation of Data Surveillance', Journal of Law and Information Science, 1993 4(2)
-
(1993)
Journal of Law and Information Science, 1993
, vol.4
, Issue.2
-
-
Roger, C.1
-
25
-
-
77958186712
-
A Free and Comprehensive Guide to the World of Forensic Psychology
-
URL
-
Webb, D. (2007), 'A Free and Comprehensive Guide to the World of Forensic Psychology', 'All about Forensic Psychology', URL: http://www.all-aboutforensic-psychology.com
-
(2007)
All about Forensic Psychology
-
-
Webb, D.1
-
26
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
(Montral, Qubec, Canada, April 22-27, 2006)'. CHI '06. ACM, NY
-
Wu, M., Miller, R. C. & Garfinkel, S. L. (2006), 'Do security toolbars actually prevent phishing attacks?', in ' Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montral, Qubec, Canada, April 22 - 27, 2006)'. CHI '06. ACM, NY, pp. 601-610.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
|