Sciweavers

6318 search results - page 1203 / 1264
» Data Leakage Detection
Sort
View
SIGIR
2012
ACM
13 years 4 months ago
Predicting quality flaws in user-generated content: the case of wikipedia
The detection and improvement of low-quality information is a key concern in Web applications that are based on user-generated content; a popular example is the online encyclopedi...
Maik Anderka, Benno Stein, Nedim Lipka
ICDCS
2012
IEEE
13 years 4 months ago
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments
Abstract—In this paper we have proposed and designed FindingHuMo (Finding Human Motion), a real-time user tracking system for Smart Environments. FindingHuMo can perform device-f...
Debraj De, Wen-Zhan Song, Mingsen Xu, Cheng-Liang ...
TRECVID
2007
15 years 2 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen
BMCBI
2010
167views more  BMCBI 2010»
15 years 1 months ago
Creating PWMs of transcription factors using 3D structure-based computation of protein-DNA free binding energies
Background: Knowledge of transcription factor-DNA binding patterns is crucial for understanding gene transcription. Numerous DNA-binding proteins are annotated as transcription fa...
Denitsa Alamanova, Philip Stegmaier, Alexander E. ...
CVPR
2009
IEEE
16 years 9 months ago
Implicit Elastic Matching with Random Projections for Pose-variant Face Recognition
We present a new approach to robust pose-variant face recognition, which exhibits excellent generalization ability even across completely different datasets due to its weak depe...
John Wright (University of Illinois), Gang Hua (Mi...
« Prev « First page 1203 / 1264 Last » Next »