aristocracy 发表于 2025-3-28 16:56:58
The Influence of Color on Prices of Abstract Paintings a painting have on its price. We construct a number of visual features in CIELAB color space measuring complexity of the painting, its points of interest using Discrete symmetry transform, segmentation-based features using Felzenszwalb segmentation and Regions adjacency graph merging, local color f上流社会 发表于 2025-3-28 18:58:31
http://reply.papertrans.cn/24/2323/232224/232224_42.pngJacket 发表于 2025-3-29 02:39:21
Knowledge Transfer via Word Alignment and Its Application to Vietnamese POS Tagging Vietnamese. Due to the development and investment in research, there is no large and high-accuracy annotated corpus. This paper proposes a transfer learning strategy to build a high-quality tagger for Vietnamese using a bilingual corpus Vietnamese-English. Particularly, We inherit the strength of aGleason-score 发表于 2025-3-29 03:43:25
http://reply.papertrans.cn/24/2323/232224/232224_44.pngRelinquish 发表于 2025-3-29 08:27:01
http://reply.papertrans.cn/24/2323/232224/232224_45.pngchoroid 发表于 2025-3-29 12:11:53
Targeted Attack of the Air Transportation Network Global Componentven centrality measure. Although most real-world networks exhibit a mesoscopic structure, strategies proposed in the literature do not exploit this ubiquitous property. We introduce an attack strategy based on the network component structure to overcome these drawbacks. The component structure of a狂怒 发表于 2025-3-29 16:43:57
Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspectivety in cryptocurrencies is “mining pools”, groups of cooperating cryptocurrency miners who agree to share block rewards in proportion to their contributed mining hash power. Despite the many promised benefits of cryptocurrencies, they are equally utilized for malicious activities, e.g., ransomware pa改革运动 发表于 2025-3-29 22:28:11
Do Content Management Systems Impact the Security of Free Content Websites?1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizing the unpatched vulnerabilities, total vulnerabilMetastasis 发表于 2025-3-30 02:53:18
BNnetXtreme: An Enhanced Methodology for Bangla Fake News Detection Onlineas there have been significant events in various cities due to unjustifiable rumors. But the overall progress in study and innovation in the detection of Bangla fake and misleading news is still not adequate in light of the prospects for policymakers in Bangladesh. In this study, an enhanced methodo很像弓] 发表于 2025-3-30 07:37:33
Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Soceir interactions with the network. Since some users have a higher propensity for disclosure than others, a one-size-fits-all technique for limiting manipulation proves insufficient. In this work, we propose a model that allows the user to adjust their online persona to limit their susceptibility to