Sciweavers

1929 search results - page 251 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
147
Voted
ICIP
2010
IEEE
15 years 2 months ago
People identification using shadow dynamics
People identification has numerous applications, ranging from surveillance/security to robotics. Face and body movement/gait biometrics are the most important tools for this task....
Yumi Iwashita, Adrian Stoica, Ryo Kurazume
ICML
2001
IEEE
16 years 5 months ago
Constrained K-means Clustering with Background Knowledge
Clustering is traditionally viewed as an unsupervised method for data analysis. However, in some cases information about the problem domain is available in addition to the data in...
Kiri Wagstaff, Claire Cardie, Seth Rogers, Stefan ...
SIGIR
2009
ACM
15 years 11 months ago
Identifying the original contribution of a document via language modeling
Abstract. One major goal of text mining is to provide automatic methods to help humans grasp the key ideas in ever-increasing text corpora. To this effect, we propose a statistica...
Benyah Shaparenko, Thorsten Joachims
144
Voted
JCDL
2009
ACM
179views Education» more  JCDL 2009»
15 years 11 months ago
Disambiguating authors in academic publications using random forests
Users of digital libraries usually want to know the exact author or authors of an article. But different authors may share the same names, either as full names or as initials and...
Pucktada Treeratpituk, C. Lee Giles
CVPR
2007
IEEE
15 years 11 months ago
Visual Event Recognition in News Video using Kernel Methods with Multi-Level Temporal Alignment
In this work, we systematically study the problem of visual event recognition in unconstrained news video sequences. We adopt the discriminative kernel-based method for which vide...
Dong Xu, Shih-Fu Chang