Sciweavers

9316 search results - page 168 / 1864
» Analysis of traceback techniques
Sort
View
ACL
2009
15 years 1 months ago
The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language
In this paper, we present initial experiments in the recognition of deceptive language. We introduce three data sets of true and lying texts collected for this purpose, and we sho...
Rada Mihalcea, Carlo Strapparava
ICDAR
2009
IEEE
15 years 1 months ago
Document Image Binarisation Using Markov Field Model
This paper presents a new approach for the binarization of seriously degraded manuscript. We introduce a new technique based on a Markov Random Field (MRF) model of the document. ...
Thibault Lelore, Frédéric Bouchara
ICDAR
2009
IEEE
15 years 1 months ago
HMM Based Handwritten Word Recognition System by Using Singularities
This paper presents a new approach for Handwritten Word Recognition based on Hidden Markov Model theory and the sliding window technique. The new approach uses specific singularit...
Sebastiano Impedovo, Anna Ferrante, Raffaele Modug...
WIFT
1998
IEEE
153views Hardware» more  WIFT 1998»
15 years 8 months ago
Reasoning with UML Class Diagrams
The Unified Modeling Language (UML) is likely to become an important industry standard language for modelling object-oriented systems. However, its use as a precise analysis tool ...
Andy S. Evans
ICISS
2009
Springer
15 years 10 months ago
A Framework for Behavior-Based Malware Analysis in the Cloud
Abstract. To ease the analysis of potentially malicious programs, dynamic behavior-based techniques have been proposed in the literature. Unfortunately, these techniques often give...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...