Sciweavers

5234 search results - page 180 / 1047
» Method Components - Rationale Revealed
Sort
View
COLING
2010
14 years 10 months ago
The Bag-of-Opinions Method for Review Rating Prediction from Sparse Text Patterns
The problem addressed in this paper is to predict a user's numeric rating in a product review from the text of the review. Unigram and n-gram representations of text are comm...
Lizhen Qu, Georgiana Ifrim, Gerhard Weikum
119
Voted
JCIT
2010
112views more  JCIT 2010»
14 years 10 months ago
A Preprocessing Method for NaXi Pictograph Character Recognition
Preprocessing, a major component of Character Recognition System, has direct effect on the recognition system by its performance. A preprocessing method for NaXi Pictograph Charac...
Hai Guo, Jing-ying Zhao, Ming-jun Da
CEAS
2008
Springer
15 years 5 months ago
Empirical research on IP blacklisting
This paper describes two innovative analysis methods for IPv4 address sets such as antispam blacklists. First, the contents analysis provides means of measuring key properties of ...
Christian Dietrich, Christian Rossow
121
Voted
ICASSP
2009
IEEE
15 years 10 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
15 years 8 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho