Skip to main content

Showing 1–3 of 3 results for author: Sahin, C S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1907.05283  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    A Comparison of Super-Resolution and Nearest Neighbors Interpolation Applied to Object Detection on Satellite Data

    Authors: Evan Koester, Cem Safak Sahin

    Abstract: As Super-Resolution (SR) has matured as a research topic, it has been applied to additional topics beyond image reconstruction. In particular, combining classification or object detection tasks with a super-resolution preprocessing stage has yielded improvements in accuracy especially with objects that are small relative to the scene. While SR has shown promise, a study comparing SR and naive upsc… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

  2. arXiv:1702.07680  [pdf, other

    cs.CL cs.IR stat.ML

    Consistent Alignment of Word Embedding Models

    Authors: Cem Safak Sahin, Rajmonda S. Caceres, Brandon Oselio, William M. Campbell

    Abstract: Word embedding models offer continuous vector representations that can capture rich contextual semantics based on their word co-occurrence patterns. While these word vectors can provide very effective features used in many NLP tasks such as clustering similar words and inferring learning relationships, many challenges and open research questions remain. In this paper, we propose a solution that al… ▽ More

    Submitted 24 February, 2017; originally announced February 2017.

    Comments: 4 pages, 2 figures

  3. arXiv:1512.05814  [pdf, other

    cs.CR

    General Framework for Evaluating Password Complexity and Strength

    Authors: Cem S. Sahin, Robert Lychev, Neal Wagner

    Abstract: Although it is common for users to select bad passwords that can be easily cracked by attackers, password-based authentication remains the most widely-used method. To encourage users to select good passwords, enterprises often enforce policies. Such policies have been proven to be ineffectual in practice. Accurate assessment of a password's resistance to cracking attacks is still an unsolved probl… ▽ More

    Submitted 17 December, 2015; originally announced December 2015.

    Comments: 11 pages and 4 figures

    ACM Class: D.4.6; K.6.5