Sciweavers

947 search results - page 132 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
USS
2008
15 years 3 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
CIVR
2008
Springer
213views Image Analysis» more  CIVR 2008»
15 years 3 months ago
Language modeling for bag-of-visual words image categorization
In this paper, we propose two ways of improving image classification based on bag-of-words representation [25]. Two shortcomings of this representation are the loss of the spatial...
Pierre Tirilly, Vincent Claveau, Patrick Gros
ICIP
2010
IEEE
14 years 11 months ago
Multiplexed clustered-dot halftone watermarks using bi-directional phase modulation and detection
We present a method for embedding and detection of visual watermark patterns in printed images that use clustered-dot halftones in the printing process. The method allows two inde...
Basak Oztan, Gaurav Sharma
SIGSOFT
2004
ACM
15 years 6 months ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...
EMNLP
2009
14 years 11 months ago
Adapting a Polarity Lexicon using Integer Linear Programming for Domain-Specific Sentiment Classification
Polarity lexicons have been a valuable resource for sentiment analysis and opinion mining. There are a number of such lexical resources available, but it is often suboptimal to us...
Yejin Choi, Claire Cardie