Sciweavers

1211 search results - page 207 / 243
» Computing Manipulations of Ranking Systems
Sort
View
DIMVA
2008
13 years 9 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
WSC
2004
13 years 9 months ago
Applying Statistical Control Techniques to Air Traffic Simulations
While the literature contains several adaptive sampling techniques for statistical comparison of competing simulated system configurations and for embedded statistical computation...
Kirk C. Benson, David Goldsman, Amy R. Pritchett
ICDAR
2009
IEEE
13 years 5 months ago
Recurrent HMMs and Cursive Handwriting Recognition Graphs
Standard cursive handwriting recognition is based on a language model, mostly a lexicon of possible word hypotheses or character n-grams. The result is a list of word alternatives...
Marc-Peter Schambach
WSDM
2012
ACM
214views Data Mining» more  WSDM 2012»
12 years 3 months ago
Selecting actions for resource-bounded information extraction using reinforcement learning
Given a database with missing or uncertain content, our goal is to correct and fill the database by extracting specific information from a large corpus such as the Web, and to d...
Pallika H. Kanani, Andrew K. McCallum
TOG
2008
236views more  TOG 2008»
13 years 7 months ago
Face swapping: automatically replacing faces in photographs
In this paper, we present a complete system for automatic face replacement in images. Our system uses a large library of face images created automatically by downloading images fr...
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Pete...