Search
Search Results
-
CRFs for Digital Signature and NIZK Proof System in Web Services
Web services are service-oriented computing technology which allows computers running different operating domains to access and share each other’s... -
A modified EM-type algorithm to estimate semi-parametric mixtures of non-parametric regressions
Semi-parametric Gaussian mixtures of non-parametric regressions (SPGMNRs) are a flexible extension of Gaussian mixtures of linear regressions...
-
Multi-level Memory Network with CRFs for Keyphrase Extraction
Keyphrase, that concisely describe the high-level topics discussed in a document, are very useful for a wide range of natural language processing... -
Automatic Recognition of Chinese Separable Words Based on CRFs
Currently, most of the automatic recognition tasks of separable words adopt a rule-based method, which relies on automatic word segmentation results... -
Indoor scene understanding via RGB-D image segmentation employing depth-based CNN and CRFs
With the availability of low-cost depth-visual sensing devices, such as Microsoft Kinect, we are experiencing a growing interest in indoor...
-
Towards Idea Mining: Problem-Solution Phrase Extraction from Text
This paper investigates the feasibility of problem-solution phrases extraction from scientific publications using neural network approaches.... -
Canonical and Surface Morphological Segmentation for Nguni Languages
Morphological Segmentation involves decomposing words into morphemes, the smallest meaning-bearing units of language. This is an important NLP task... -
Only overlay text: novel features for TV news broadcast video segmentation
Segmentation of television news videos into programs and stories (after removing advertisements) is a necessary first step for news broadcast...
-
FinBERT–MRC: Financial Named Entity Recognition Using BERT Under the Machine Reading Comprehension Paradigm
Financial named entity recognition (FinNER) is a challenging task in the field of financial text information extraction, which aims to extract a...
-
UC-Secure Cryptographic Reverse Firewall–Guarding Corrupted Systems with the Minimum Trusted Module
Nowadays, mass-surveillance is becoming an increasingly severe threat to the public’s privacy. The PRISM and a series of other events showed that... -
Deep Neural Networks Regularization Using a Combination of Sparsity Inducing Feature Selection Methods
Deep learning is an important subcategory of machine learning approaches in which there is a hope of replacing man-made features with fully automatic...
-
Salient Object Detection with CNNs and Multi-scale CRFs
Recent CNNs based salient object detection approaches tend to embed a fully connected Conditional Random Field (CRF) layer to refine the saliency... -
Multidimensional Team Communication Modeling for Adaptive Team Training: A Hybrid Deep Learning and Graphical Modeling Framework
Team communication modeling offers great potential for adaptive learning environments for team training. However, the complex dynamics of team... -
Single-Image Camera Response Function Using Prediction Consistency and Gradual Refinement
A few methods have been proposed to estimate the CRF from a single image, however most of them tend to fail in handling general real images. For... -
Research on Chinese Word Segmentation Based on Conditional Random Fields
Word segmentation is the first step in Chinese natural language processing. The accuracy of segmentation has substantial impacts on subsequent tasks... -
Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls
With the prevalence of information sharing, preserving the confidentiality of sensitive data has become paramount. Attribute-based encryption (ABE)... -
Double-Stream Network for Clothes-Changing Person Re-identification Based on Clothes Related Feature Suppression and Attention Mechanism
The standard person re-identification task has a basic assumption that pedestrians will not change their clothes. However, in a more realistic and... -
A Semantic Framework for Chinese Historical Events Based on Linked Data and Knowledge Graph
In the era of big data, data redundancy has become an obstacle to deep reading. The objective of linked data as a new data organization model is to... -
A Blockchain-Based Proxy Re-Encryption Scheme with Cryptographic Reverse Firewall for IoV
As the Internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, road side instrument, and the... -
Lexical Analysis and Parsing Using Deep Learning
This chapter explains the concepts related to deep learning in lexical analysis and parsing with practical examples and accompanied code.