Sciweavers

198 search results - page 12 / 40
» Exploiting Object Hierarchy: Combining Models from Different...
Sort
View
ICPR
2008
IEEE
14 years 1 months ago
Double-edge-model based character stroke extraction from complex backgrounds
Global gray-level thresholding techniques such as Otsu’s method, and local gray-level thresholding techniques such as adaptive thresholding method are powerful in extracting cha...
Jing Yu, Lei Huang, Changping Liu
SIGIR
2002
ACM
13 years 7 months ago
Generic summarization and keyphrase extraction using mutual reinforcement principle and sentence clustering
A novel method for simultaneous keyphrase extraction and generic text summarization is proposed by modeling text documents as weighted undirected and weighted bipartite graphs. Sp...
Hongyuan Zha
ICSE
2005
IEEE-ACM
14 years 7 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
EPIA
2009
Springer
13 years 11 months ago
Semantic Image Search and Subset Selection for Classifier Training in Object Recognition
Abstract. Robots need to ground their external vocabulary and internal symbols in observations of the world. In recent works, this problem has been approached through combinations ...
Rui Pereira, Luís Seabra Lopes, Augusto Sil...
EXPCS
2007
13 years 9 months ago
Pipeline spectroscopy
Pipeline Spectroscopy is a new technique that allows us to measure the cost of each cache miss. The cost of a miss is displayed (graphed) as a histogram, which represents a precis...
Thomas R. Puzak, Allan Hartstein, Philip G. Emma, ...