Sciweavers

236 search results - page 4 / 48
» From Weak to Strong Watermarking
Sort
View
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
AAAI
2004
13 years 11 months ago
Just How Mad Are You? Finding Strong and Weak Opinion Clauses
There has been a recent swell of interest in the automatic identification and extraction of opinions and emotions in text. In this paper, we present the first experimental results...
Theresa Wilson, Janyce Wiebe, Rebecca Hwa
MP
2011
13 years 20 days ago
Strong KKT conditions and weak sharp solutions in convex-composite optimization
Using variational analysis techniques, we study convex-composite optimization problems. In connection with such a problem, we introduce several new notions as variances of the clas...
Xi Yin Zheng, Kung Fu Ng
ESOP
2010
Springer
14 years 7 months ago
Fluid Updates: Beyond Strong vs. Weak Updates
Abstract. We describe a symbolic heap abstraction that unifies reasoning about arrays, pointers, and scalars, and we define a fluid update operation on this symbolic heap that rela...
Isil Dillig, Thomas Dillig and Alex Aiken
ICASSP
2008
IEEE
14 years 4 months ago
Combination of strongly and weakly constrained recognizers for reliable detection of OOVS
This paper addresses the detection of OOV segments in the output of large vocabulary continuous speech recognition (LVCSR) system. First, standard confidence measures based on fr...
Lukas Burget, Petr Schwarz, Pavel Matejka, Mirko H...