Sciweavers

470 search results - page 55 / 94
» Using Unknown Word Techniques to Learn Known Words
Sort
View
MM
2004
ACM
170views Multimedia» more  MM 2004»
14 years 1 months ago
Effective automatic image annotation via a coherent language model and active learning
Image annotations allow users to access a large image database with textual queries. There have been several studies on automatic image annotation utilizing machine learning techn...
Rong Jin, Joyce Y. Chai, Luo Si
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
ESSOS
2010
Springer
14 years 4 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
STOC
1993
ACM
141views Algorithms» more  STOC 1993»
13 years 12 months ago
Bounds for the computational power and learning complexity of analog neural nets
Abstract. It is shown that high-order feedforward neural nets of constant depth with piecewisepolynomial activation functions and arbitrary real weights can be simulated for Boolea...
Wolfgang Maass
MM
2010
ACM
198views Multimedia» more  MM 2010»
13 years 8 months ago
Analyzing and predicting sentiment of images on the social web
In this paper we study the connection between sentiment of images expressed in metadata and their visual content in the social photo sharing environment Flickr. To this end, we co...
Stefan Siersdorfer, Enrico Minack, Fan Deng, Jonat...