Sciweavers

499 search results - page 64 / 100
» A Study on Latent Vulnerabilities
Sort
View
129
Voted
NIPS
2008
15 years 1 months ago
Learning the Semantic Correlation: An Alternative Way to Gain from Unlabeled Text
In this paper, we address the question of what kind of knowledge is generally transferable from unlabeled text. We suggest and analyze the semantic correlation of words as a gener...
Yi Zhang 0010, Jeff Schneider, Artur Dubrawski
IJCV
2008
139views more  IJCV 2008»
15 years 14 days ago
Multilevel Image Coding with Hyperfeatures
Histograms of local appearance descriptors are a popular representation for visual recognition. They are highly discriminant with good resistance to local occlusions and to geomet...
Ankur Agarwal, Bill Triggs
112
Voted
SDM
2010
SIAM
166views Data Mining» more  SDM 2010»
14 years 11 months ago
Directed Network Community Detection: A Popularity and Productivity Link Model
In this paper, we consider the problem of community detection in directed networks by using probabilistic models. Most existing probabilistic models for community detection are ei...
Tianbao Yang, Yun Chi, Shenghuo Zhu, Yihong Gong, ...
91
Voted
EMNLP
2010
14 years 10 months ago
Lessons Learned in Part-of-Speech Tagging of Conversational Speech
This paper examines tagging models for spontaneous English speech transcripts. We analyze the performance of state-of-the-art tagging models, either generative or discriminative, ...
Vladimir Eidelman, Zhongqiang Huang, Mary P. Harpe...
101
Voted
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
14 years 10 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...