Sciweavers

305 search results - page 56 / 61
» Classification integration and reclassification using constr...
Sort
View
AMFG
2003
IEEE
126views Biometrics» more  AMFG 2003»
15 years 2 months ago
Rank Constrained Recognition under Unknown Illuminations
Recognition under illumination variations is a challenging problem. The key is to successfully separate the illumination source from the observed appearance. Once separated, what ...
Shaohua Kevin Zhou, Rama Chellappa
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
15 years 2 months ago
XML Based Robust Client-Server Communication for a Distributed Telecommunication Management System
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...
Karl M. Göschka, Helmut Reis, Robert Smeikal
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
15 years 11 months ago
Counting at Large: Efficient Cardinality Estimation in Internet-Scale Data Networks
Counting in general, and estimating the cardinality of (multi-) sets in particular, is highly desirable for a large variety of applications, representing a foundational block for ...
Nikos Ntarmos, Peter Triantafillou, Gerhard Weikum
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
15 years 9 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
IJCAI
2007
14 years 11 months ago
Recursive Random Fields
A formula in first-order logic can be viewed as a tree, with a logical connective at each node, and a knowledge base can be viewed as a tree whose root is a conjunction. Markov l...
Daniel Lowd, Pedro Domingos