Sciweavers

10979 search results - page 1921 / 2196
» Visual information extraction
Sort
View
TSMC
2011
324views more  TSMC 2011»
14 years 11 months ago
Genetic Algorithms With Guided and Local Search Strategies for University Course Timetabling
—The university course timetabling problem (UCTP) is a combinatorial optimization problem, in which a set of events has to be scheduled into time slots and located into suitable ...
Shengxiang Yang, Sadaf Naseem Jat
TSMC
2011
292views more  TSMC 2011»
14 years 11 months ago
Circular Blurred Shape Model for Multiclass Symbol Recognition
—In this paper, we propose a circular blurred shape model descriptor to deal with the problem of symbol detection and classification as a particular case of object recognition. ...
Sergio Escalera, Alicia Fornés, Oriol Pujol...
WWW
2011
ACM
14 years 11 months ago
Learning facial attributes by crowdsourcing in social media
Facial attributes such as gender, race, age, hair style, etc., carry rich information for locating designated persons and profiling the communities from image/video collections (...
Yan-Ying Chen, Winston H. Hsu, Hong-Yuan Mark Liao
141
Voted
ITIIS
2010
130views more  ITIIS 2010»
14 years 11 months ago
A Novel System for Detecting Adult Images on the Internet
As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen. To help prevent adolescents accessi...
Jae-Yong Park, Sang-Sung Park, Young-Geun Shin, Do...
JMLR
2010
185views more  JMLR 2010»
14 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
« Prev « First page 1921 / 2196 Last » Next »