The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Semi-Markov conditional random fields (semi-CRFs) are usually trained with maximum a posteriori (MAP) criterion which adopts the 0/1 cost for measuring the loss of misclassification. In this paper, based on our previous work on handwritten Chinese/Japanese text recognition (HCTR) using semi-CRFs, we propose an alternative parameter learning method by minimizing the risk, in which the misclassification...
At present, only the exhaustive synthesis algorithm can find all the optimal quantum Boolean circuits. It is more difficult to synthesize a more complicated quantum Boolean circuit. In this paper, we use the method of circuit bipartition to partition a more complicated quantum Boolean circuit into simpler circuits in order to reduce the difficulty of the more complicated quantum Boolean circuit synthesis...
Mr. Chang Lai Yulian (±i¿à¥É·G, 1901-1961) was a master of poetry and dedicated his life to the agricultural development and education of his hometown -- the Dakeng Jungongliao District, Taichung County. On December 1st 2008, the Chang Lai Family donated all Mr. Chang Lai Yulian¡¦s manuscripts, a total of 893 manuscripts in 432 volumes, to the institution of his residence¡XCentral Taiwan University...
In this paper, we present a new sketch-based system - KnitSketch, to improve the efficiency of process planning for knitting garments at an early design stage. The KnitSketch system utilizes sketching interface with the pen-paper metaphor and users only need to draw outlines of different parts of the garment. Based on sketching understanding, the system automatically makes reasonable geometric inferences...
Now that multiple-known attacks can affect one software product at the same time, it is necessary to rank and prioritize those attacks in order to establish a better defense. The purpose of this paper is to provide a set of security metrics to rank attacks based on vulnerability analysis. The vulnerability information is retrieved from a vulnerability management ontology, which integrates commonly...
As the number of software vulnerabilities increases year by year, software vulnerability becomes a focusing point in information security. This paper proposes a vulnerability similarity measurement to compare different vulnerabilities according to a set of criteria. Our approach is based on the structural hierarchy of vulnerabilities, and the similarity is defined using established mathematical models...
In this article, we present a content-based video search service for mobile device users. After taking a photograph, the user can upload it to our server, which will then return videos containing key frames that are similar to the uploaded picture. The proposed service demonstrates that the search application is feasible.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.