Resolving FP-TP Conflict in Digest-Based Collaborative Spam Detection by Use of Negative Selection Algorithm
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community -driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys a ...
Unsupervised template induction over email data is a central component in applications such as information extraction, document classification, and auto-reply. The benefits of automatically generating such templates are known for structured data, e.g. mach ...
The extensive and successful use of social media has enhanced and empowered a variety of movements all over the world in a way that is hard to achieve through conventional means. This has led to numerous studies that leverage online social data to describe ...
In this paper we investigate how the knowledge production function is at work in different industrial sectors comparing mature and young companies in Italy. We estimate a two-step model using community innovation survey data. We provide evidence that young ...
The PIN domain plays a central role in cellular RNA biology and is involved in processes as diverse as rRNA maturation, mRNA decay and telomerase function. Here, we solve the crystal structure of the Rae1 (YacP) protein of Bacillus subtilis, a founding mem ...
Big Data is not a new phenomenon. History is punctuated by regimes of data acceleration, characterized by feelings of information overload accompanied by periods of social transformation and the invention of new technologies. During these moments, private ...
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of establishing counter- measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of anti-spoofing s ...
Machine Translation (MT) has progressed tremendously in the past two decades. The rule-based and interlingua approaches have been superseded by statistical models, which learn the most likely translations from large parallel corpora. System design does not ...
Oscillator system (1) comprising:- a substantially planar frame (3);- a first sub-oscillator (5), a second sub-oscillator (7), a third sub-oscillator (9), and a fourth sub-oscillator (11), each sub-oscillator (5, 7, 9, 11) comprising a substantially rigid ...
Different senses of source words must often be rendered by different words in the target language when performing machine translation (MT). Selecting the correct translation of polysemous words can be done based on the contexts of use. However, state-of-th ...