Sciweavers

5948 search results - page 367 / 1190
» Computing Robust Counter-Strategies
Sort
View
CVPR
2012
IEEE
13 years 7 months ago
Fixed-rank representation for unsupervised visual learning
Subspace clustering and feature extraction are two of the most commonly used unsupervised learning techniques in computer vision and pattern recognition. State-of-theart technique...
Risheng Liu, Zhouchen Lin, Fernando De la Torre, Z...
COLING
2002
15 years 4 months ago
An Agent-based Approach to Chinese Named Entity Recognition
Chinese NE (Named Entity) recognition is a difficult problem because of the uncertainty in word segmentation and flexibility in language structure. This paper proposes the use of ...
Shiren Ye, Tat-Seng Chua, Jimin Liu
PR
2000
166views more  PR 2000»
15 years 4 months ago
A window-based inverse Hough transform
In this paper a new Hough transform inversion technique is proposed. It is a window-based inverse Hough transform algorithm, which reconstructs the original image using only the d...
Anastasios L. Kesidis, Nikos Papamarkos
JMLR
2002
160views more  JMLR 2002»
15 years 4 months ago
Kernel Independent Component Analysis
We present a class of algorithms for independent component analysis (ICA) which use contrast functions based on canonical correlations in a reproducing kernel Hilbert space. On th...
Francis R. Bach, Michael I. Jordan
JMLR
2002
138views more  JMLR 2002»
15 years 4 months ago
Text Chunking based on a Generalization of Winnow
This paper describes a text chunking system based on a generalization of the Winnow algorithm. We propose a general statistical model for text chunking which we then convert into ...
Tong Zhang, Fred Damerau, David Johnson