Sciweavers

586 search results - page 75 / 118
» Algorithmic Detection of Computer Generated Text
Sort
View
CSFW
2007
IEEE
15 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ACMACE
2004
ACM
15 years 3 months ago
The intelligent street: responsive sound environments for social interaction
The Intelligent Street is a music installation that is able to respond intelligently to the collective requests of users interacting together. The performance it creates is largel...
Henrik Lörstad, Mark d'Inverno, John Eacott
COLING
2010
14 years 4 months ago
Recognizing Medication related Entities in Hospital Discharge Summaries using Support Vector Machine
Due to the lack of annotated data sets, there are few studies on machine learning based approaches to extract named entities (NEs) in clinical text. The 2009 i2b2 NLP challenge is...
Son Doan, Hua Xu
75
Voted
ARITH
2007
IEEE
15 years 4 months ago
Decimal Floating-Point Multiplication Via Carry-Save Addition
Decimal multiplication is important in many commercial applications including financial analysis, banking, tax calculation, currency conversion, insurance, and accounting. This p...
Mark A. Erle, Michael J. Schulte, Brian J. Hickman...
66
Voted
ICPR
2006
IEEE
15 years 10 months ago
Epipolar Geometry from Two Correspondences
A novel algorithm for robust RANSAC-like estimation of epipolar geometry (of uncalibrated camera pair) from two correspondences of local affine frames (LAFs) is presented. Each LA...
Michal Perdoch, Jiri Matas, Ondrej Chum