Skip to main content

Showing 1–5 of 5 results for author: Richard, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.08153  [pdf, other

    cs.CL

    Fast Training of NMT Model with Data Sorting

    Authors: Daniela N. Rim, Kimera Richard, Heeyoul Choi

    Abstract: The Transformer model has revolutionized Natural Language Processing tasks such as Neural Machine Translation, and many efforts have been made to study the Transformer architecture, which increased its efficiency and accuracy. One potential area for improvement is to address the computation of empty tokens that the Transformer computes only to discard them later, leading to an unnecessary computat… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

  2. arXiv:2211.11607  [pdf

    cs.CV cs.LG

    Semantic Segmentation for Fully Automated Macrofouling Analysis on Coatings after Field Exposure

    Authors: Lutz M. K. Krause, Emily Manderfeld, Patricia Gnutt, Louisa Vogler, Ann Wassick, Kailey Richard, Marco Rudolph, Kelli Z. Hunsucker, Geoffrey W. Swain, Bodo Rosenhahn, Axel Rosenhahn

    Abstract: Biofouling is a major challenge for sustainable shipping, filter membranes, heat exchangers, and medical devices. The development of fouling-resistant coatings requires the evaluation of their effectiveness. Such an evaluation is usually based on the assessment of fouling progression after different exposure times to the target medium (e.g., salt water). The manual assessment of macrofouling requi… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: 33 pages, 10 figures

  3. arXiv:2209.09630  [pdf

    cs.CR cs.LG

    Detection of Malicious Websites Using Machine Learning Techniques

    Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard

    Abstract: In detecting malicious websites, a common approach is the use of blacklists which are not exhaustive in themselves and are unable to generalize to new malicious sites. Detecting newly encountered malicious websites automatically will help reduce the vulnerability to this form of attack. In this study, we explored the use of ten machine learning models to classify malicious websites based on lexica… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

  4. arXiv:2009.01046  [pdf, other

    cs.CL cs.LG stat.ML

    Generalisation of Cyberbullying Detection

    Authors: Khoury Richard, Larochelle Marc-André

    Abstract: Cyberbullying is a problem in today's ubiquitous online communities. Filtering it out of online conversations has proven a challenge, and efforts have led to the creation of many different datasets, all offered as resources to train classifiers. Through these datasets, we will explore the variety of definitions of cyberbullying behaviors and the impact of these differences on the portability of on… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

  5. arXiv:1003.4908  [pdf

    cs.SD

    Perceptual analyses of action-related impact sounds

    Authors: Marie-Céline Bezat, Vincent Roussarie, Kronland-Martinet Richard, Solvi Ystad, Stephen Mcadams

    Abstract: Among environmental sounds, we have chosen to study a class of action-related impact sounds: automobile door closure sounds. We propose to describe these sounds using a model composed of perceptual properties. The development of the perceptual model was derived from the evaluation of many door closure sounds measured under controlled laboratory listening conditions. However, listening to such soun… ▽ More

    Submitted 25 March, 2010; originally announced March 2010.

    Journal ref: Euronoise 2006, Tampere : France (2006)