Vis enkel innførsel

dc.contributor.authorChitrakar, Ambika Shrestha
dc.contributor.authorPetrovic, Slobodan
dc.date.accessioned2016-02-04T08:46:27Z
dc.date.accessioned2016-03-01T08:21:25Z
dc.date.available2016-02-04T08:46:27Z
dc.date.available2016-03-01T08:21:25Z
dc.date.issued2015
dc.identifier.citationChitrakar, A. S., & Petrovic, S. (2015). Approximate search with constraints on indels with application in SPAM filtering. Norsk Informasjonssikkerhetskonferanse (NISK), 22-33. Retrieved from http://www.frisc.no/arrangementer/nisk-2012-4/nb_NO
dc.identifier.issn1894-7735
dc.identifier.urihttp://hdl.handle.net/11250/2380987
dc.description-nb_NO
dc.description.abstractFinding distorted occurrences of search pattern(s) in the search string by applying constraints on elementary edit operations (indels (insertions/deletions) and substitutions) is a new category of the approximate string search problem that we introduce in this paper. The constraint on the total number of indels can improve the search efficiency when one knows the probabilities of these edit operations for the distorted pattern/text. Two approximate search algorithms with such a constraint, CRBP-Indels and Sankoff-Indels, are presented here and their performances are evaluated for different probabilities of insertions, deletions, and substitutions. The experimental results show that CRBP-Indels has better performance over Sankoff-Indels when the number of indels is greater than the number of substitutions. However, the Sankoff- Indels algorithm is better if the number of substitutions is greater than the number of indels. Possible application of these algorithms is in SPAM filtering for detection of deliberately distorted SPAM-words. In such a scenario, the number of indels applied on the original SPAM-words must be limited in order to maintain their intelligibility.nb_NO
dc.language.isoengnb_NO
dc.relation.urihttp://ojs.bibsys.no/index.php/NISK/article/view/295/257
dc.titleApproximate search with constraints on indels with application in SPAM filteringnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.date.updated2016-02-04T08:46:27Z
dc.source.pagenumber22-33nb_NO
dc.source.volumeNISK 2015nb_NO
dc.source.journalNorsk informasjonssikkerhetskonferanse (NISK)nb_NO
dc.identifier.cristin1331808


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel