Sciweavers

1717 search results - page 282 / 344
» Error concealment using a diffusion based method
Sort
View
CVPR
2007
IEEE
15 years 12 months ago
Approximate Nearest Subspace Search with Applications to Pattern Recognition
Linear and affine subspaces are commonly used to describe appearance of objects under different lighting, viewpoint, articulation, and identity. A natural problem arising from the...
Ronen Basri, Tal Hassner, Lihi Zelnik-Manor
ISBI
2004
IEEE
15 years 10 months ago
A Deformable Brodmann Area Atlas
Functional MRI studies commonly refer to activation patterns as being localized in specific Brodmann areas, referring to Brodmann's divisions of the human cortex based on cyt...
Paul Rasser, Philip Ward, Patrick Johnston, Paul M...
PKDD
2007
Springer
91views Data Mining» more  PKDD 2007»
15 years 4 months ago
Domain Adaptation of Conditional Probability Models Via Feature Subsetting
The goal in domain adaptation is to train a model using labeled data sampled from a domain different from the target domain on which the model will be deployed. We exploit unlabel...
Sandeepkumar Satpal, Sunita Sarawagi
ICASSP
2011
IEEE
14 years 1 months ago
Multistream speaker diarization through Information Bottleneck system outputs combination
Speaker diarization of meetings recorded with Multiple Distant Microphones makes extensive use of multiple feature streams like MFCC and Time Delay of Arrivals (TDOA). Typically t...
Deepu Vijayasenan, Fabio Valente, Petr Motlí...
KI
2002
Springer
14 years 9 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber