Sciweavers

464 search results - page 3 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
KDD
2007
ACM
167views Data Mining» more  KDD 2007»
14 years 6 months ago
Generalized component analysis for text with heterogeneous attributes
We present a class of richly structured, undirected hidden variable models suitable for simultaneously modeling text along with other attributes encoded in different modalities. O...
Xuerui Wang, Chris Pal, Andrew McCallum
AMINING
2003
Springer
245views Data Mining» more  AMINING 2003»
13 years 11 months ago
Spiral Mining Using Attributes from 3D Molecular Structures
Active responses from experts play an essential role in the knowledge discovery of SAR (structure activity relationships) from drug data. Experts often think of hypotheses, and the...
Takashi Okada, Masumi Yamakawa, Hirotaka Niitsuma
ECIS
2001
13 years 7 months ago
An electronic polling service to support public awareness using web technologies
This paper presents a Web-based, database-oriented application called "Electronic Polling", a smart way to support voting on common subjects in which all people of a Loc...
Christos Bouras, Nikolaos Katris, Vassilis Trianta...
ICASSP
2010
IEEE
13 years 6 months ago
Removing illumination artifacts from face images using the nuisance attribute projection
Illumination induced appearance changes represent one of the open challenges in automated face recognition systems still significantly influencing their performance. Several tec...
Vitomir Struc, Bostjan Vesnicer, France Mihelic, N...
AAAI
2007
13 years 8 months ago
From Whence Does Your Authority Come? Utilizing Community Relevance in Ranking
A web page may be relevant to multiple topics; even when nominally on a single topic, the page may attract attention (and thus links) from multiple communities. Instead of indiscr...
Lan Nie, Brian D. Davison, Baoning Wu