Sciweavers

511 search results - page 78 / 103
» Privacy-preserving SVM classification
Sort
View
155
Voted
EMNLP
2009
15 years 1 months ago
On the Role of Lexical Features in Sequence Labeling
We use the technique of SVM anchoring to demonstrate that lexical features extracted from a training corpus are not necessary to obtain state of the art results on tasks such as N...
Yoav Goldberg, Michael Elhadad
135
Voted
EMNLP
2009
15 years 1 months ago
Reverse Engineering of Tree Kernel Feature Spaces
We present a framework to extract the most important features (tree fragments) from a Tree Kernel (TK) space according to their importance in the target kernelbased machine, e.g. ...
Daniele Pighin, Alessandro Moschitti
149
Voted
FI
2010
130views more  FI 2010»
15 years 28 days ago
Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures
: Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown...
Martin Güthle, Jochen Kögel, Stefan Wahl...
188
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Detecting moving objects from dynamic background with shadow removal
Background subtraction is commonly used to detect foreground objects in video surveillance. Traditional background subtraction methods are usually based on the assumption that the...
Shih-Chieh Wang, Te-Feng Su, Shang-Hong Lai
ICDAR
2011
IEEE
14 years 3 months ago
Identification of Indic Scripts on Torn-Documents
—Questioned Document Examination processes often encompass analysis of torn documents. To aid a forensic expert, automatic classification of content type in torn documents might ...
Sukalpa Chanda, Katrin Franke, Umapada Pal