Sciweavers

495 search results - page 74 / 99
» The Subword Reversing Method
Sort
View
ACCV
2010
Springer
13 years 3 months ago
A Weak Structure Model for Regular Pattern Recognition Applied to Facade Images
Abstract. We propose a novel method for recognition of structured images and demonstrate it on detection of windows in facade images. Given an ability to obtain local low-level dat...
Radim Tylecek, Radim Sára
IACR
2011
127views more  IACR 2011»
12 years 8 months ago
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers T...
Piotr Mroczkowski, Janusz Szmidt
BMCBI
2008
166views more  BMCBI 2008»
13 years 9 months ago
Learning transcriptional regulatory networks from high throughput gene expression data using continuous three-way mutual informa
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
Weijun Luo, Kurt D. Hankenson, Peter J. Woolf
CI
2006
101views more  CI 2006»
13 years 8 months ago
Sentiment Classification of Movie Reviews Using Contextual Valence Shifters
We present two methods for determining the sentiment expressed by a movie review. The semantic orientation of a review can be positive, negative, or neutral. We examine the effect...
Alistair Kennedy, Diana Inkpen
CORR
2011
Springer
160views Education» more  CORR 2011»
13 years 16 days ago
Searching for Bayesian Network Structures in the Space of Restricted Acyclic Partially Directed Graphs
Although many algorithms have been designed to construct Bayesian network structures using different approaches and principles, they all employ only two methods: those based on i...
Silvia Acid, Luis M. de Campos