• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,061
Next 10 →

A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based on Minimum Cuts

by Bo Pang , Lillian Lee - PROCEEDINGS OF THE ACL , 2004
"... Sentiment analysis seeks to identify the viewpoint(s) underlying a text span; an example application is classifying a movie review as “thumbs up” or “thumbs down”. To determine this sentiment polarity, we propose a novel machine-learning method that applies text-categorization techniques to just the ..."
Abstract - Cited by 618 (7 self) - Add to MetaCart
Sentiment analysis seeks to identify the viewpoint(s) underlying a text span; an example application is classifying a movie review as “thumbs up” or “thumbs down”. To determine this sentiment polarity, we propose a novel machine-learning method that applies text-categorization techniques to just

The FERET evaluation methodology for face recognition algorithms

by P. Jonathon Phillips, Hyeonjoon Moon, Syed A. Rizvi, Patrick J. Rauss - In (a) Example 1 (b) Example 1 (c) Right ear) (d) Mirroed Left ear
"... AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial i ..."
Abstract - Cited by 1116 (26 self) - Add to MetaCart
images and the establishment of the FERET tests. To date, 14,126 images from 1,199 individuals are included in the FERET database, which is divided into development and sequestered portions of the database. In September 1996, the FERET program administered the third in a series of FERET face

A simple method for displaying the hydropathic character of a protein

by Jack Kyte, Russell, F. Doolittle - Journal of Molecular Biology , 1982
"... A computer program that progressively evaluates the hydrophilicity and hydrophobicity of a protein along its amino acid sequence has been devised. For this purpose, a hydropathy scale has been composed wherein the hydrophilic and hydrophobic properties of each of the 20 amino acid side-chains is tak ..."
Abstract - Cited by 2287 (2 self) - Add to MetaCart
correspondence between the interior portions of their sequence and the regions appearing on the hydrophobic side of the midpoint line, as well as the exterior portions and the regions on the hydrophilic side. The correlation was demonstrated by comparisons between the plotted values and known structures

GRASP - A New Search Algorithm for Satisfiability

by Joso L Marques Silva , 1996
"... This paper introduces GRASP (Generic seaRch Algorithm for the Satisjiability Problem), an integrated algorithmic framework for SAT that un.$es several previously proposed searchpruning techniques and facilitates ident$cation of additional ones. GRASP is premised on the inevitability of confzicts dur ..."
Abstract - Cited by 449 (34 self) - Add to MetaCart
portions of the search space. In addition, by “recording ” the causes of conflicts, GRASP can recognize andpreempt the occurrence of similar conficts later on in the search. Finally, straightjwward bookkeeping of the causality chains leading up to conflicts allows GRASP to identifi assignments

Understanding Line Drawings of Scenes with Shadows

by David Waltz - The Psychology of Computer Vision , 1975
"... this paper, how can we recognize the identity of Figs. 2.1 and 2.2? Do we use' learning and knowledge to interpret what we see, or do we somehow automatically see the world as stable and independent bf lighting? What portions of scenes can we understand from local features alone, and what confi ..."
Abstract - Cited by 436 (0 self) - Add to MetaCart
this paper, how can we recognize the identity of Figs. 2.1 and 2.2? Do we use' learning and knowledge to interpret what we see, or do we somehow automatically see the world as stable and independent bf lighting? What portions of scenes can we understand from local features alone, and what

A Food Photograph Series for Identifying Portion Sizes of Culturally Specific Dishes in Rural Areas with High Incidence of Oesophageal Cancer

by Martani Lombard, Nelia Steyn, Hester-mari Burger, Karen Charlton, Marjanne Senekal , 2013
"... nutrients ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract not found

The Determinants of Credit Spread Changes.

by Pierre Collin-Dufresne , Robert S Goldstein , J Spencer Martin , Gurdip Bakshi , Greg Bauer , Dave Brown , Francesca Carrieri , Peter Christoffersen , Susan Christoffersen , Greg Duffee , Darrell Duffie , Vihang Errunza , Gifford Fong , Mike Gallmeyer , Laurent Gauthier , Rick Green , John Griffin , Jean Helwege , Kris Jacobs , Chris Jones , Andrew Karolyi , Dilip Madan , David Mauer , Erwan Morellec , Federico Nardari , N R Prabhala , Tony Sanders , Sergei Sarkissian , Bill Schwert , Ken Singleton , Chester Spatt , René Stulz - Journal of Finance , 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract - Cited by 422 (2 self) - Add to MetaCart
portion of this paper was written while Goldstein and Martin were at The Ohio State University. We thank Rui Albuquerque, Gurdip Bakshi, Greg Bauer, Dave Brown, Francesca Carrieri, Peter Christoffersen, Susan Christoffersen, Greg Duffee, Darrell Duffie, Vihang Errunza, Gifford Fong, Mike Gallmeyer

Autograph: Toward automated, distributed worm signature detection

by Hyang-ah Kim - In Proceedings of the 13th Usenix Security Symposium , 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract - Cited by 362 (3 self) - Add to MetaCart
Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading

Basic Block Distribution Analysis to Find Periodic Behavior and Simulation Points in Applications

by Tim Sherwood, Erez Perelman, Brad Calder , 2001
"... Modern architecture research relies heavily on detailed pipeline simulation. Simulating the full execution of an industry standard benchmark can take weeks to months to complete. To overcome this problem researchers choose a very small portion of a program's execution to evaluate their results, ..."
Abstract - Cited by 315 (31 self) - Add to MetaCart
Modern architecture research relies heavily on detailed pipeline simulation. Simulating the full execution of an industry standard benchmark can take weeks to months to complete. To overcome this problem researchers choose a very small portion of a program's execution to evaluate their results

Incognito: efficient full-domain k-anonymity

by Kristen Lefevre, David J. Dewitt, Raghu Ramakrishnan - In Proc. of SIGMOD
"... A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and Social Security Number, are generally removed, these databases can sometimes be joined with other public databases on attri ..."
Abstract - Cited by 304 (5 self) - Add to MetaCart
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and Social Security Number, are generally removed, these databases can sometimes be joined with other public databases
Next 10 →
Results 1 - 10 of 5,061
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University