Sciweavers

2237 search results - page 113 / 448
» On the Security of Random Sources
Sort
View
ACL
2006
15 years 6 months ago
Discriminative Word Alignment with Conditional Random Fields
In this paper we present a novel approach for inducing word alignments from sentence aligned data. We use a Conditional Random Field (CRF), a discriminative model, which is estima...
Phil Blunsom, Trevor Cohn
SOCIALCOM
2010
14 years 11 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
CVPR
2008
IEEE
16 years 7 months ago
Selective hidden random fields: Exploiting domain-specific saliency for event classification
Classifying an event captured in an image is useful for understanding the contents of the image. The captured event provides context to refine models for the presence and appearan...
Vidit Jain, Amit Singhal, Jiebo Luo
ICIP
2008
IEEE
16 years 6 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
ICML
2004
IEEE
16 years 5 months ago
Learning random walk models for inducing word dependency distributions
Many NLP tasks rely on accurately estimating word dependency probabilities P(w1|w2), where the words w1 and w2 have a particular relationship (such as verb-object). Because of the...
Kristina Toutanova, Christopher D. Manning, Andrew...