Sciweavers

2517 search results - page 78 / 504
» Specifying Weak Sets
Sort
View
167
Voted
CLOR
2006
15 years 9 months ago
Comparison of Generative and Discriminative Techniques for Object Detection and Classification
Many approaches to object recognition are founded on probability theory, and can be broadly characterized as either generative or discriminative according to whether or not the dis...
Ilkay Ulusoy, Christopher M. Bishop
140
Voted
EMNLP
2008
15 years 6 months ago
Understanding the Value of Features for Coreference Resolution
In recent years there has been substantial work on the important problem of coreference resolution, most of which has concentrated on the development of new models and algorithmic...
Eric Bengtson, Dan Roth
EJC
2000
15 years 6 months ago
User Interface Modelling with UML
Abstract. The Unified Modeling Language (UML) is a natural candidate for user interface (UI) modelling since it is the standard notation for object oriented modelling of applicatio...
Paulo Pinheiro da Silva, Norman W. Paton
230
Voted
LATINCRYPT
2010
15 years 3 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
145
Voted
ICPR
2010
IEEE
15 years 3 months ago
Text Separation from Mixed Documents Using a Tree-Structured Classifier
In this paper, we propose a tree-structured multiclass classifier to identify annotations and overlapping text from machine printed documents. Each node of the tree-structured cla...
Xujun Peng, Srirangaraj Setlur, Venu Govindaraju, ...