Sciweavers

698 search results - page 63 / 140
» Evaluating Key Statements Analysis
Sort
View
148
Voted
ECCV
2010
Springer
15 years 6 months ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov
131
Voted
BMCBI
2008
178views more  BMCBI 2008»
15 years 1 months ago
A discriminative method for protein remote homology detection and fold recognition combining Top-n-grams and latent semantic ana
Background: Protein remote homology detection and fold recognition are central problems in bioinformatics. Currently, discriminative methods based on support vector machine (SVM) ...
Bin Liu, Xiaolong Wang, Lei Lin, Qiwen Dong, Xuan ...
111
Voted
TON
2008
155views more  TON 2008»
15 years 1 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
109
Voted
LRE
2007
101views more  LRE 2007»
15 years 1 months ago
The CHIL audiovisual corpus for lecture and meeting analysis inside smart rooms
The analysis of lectures and meetings inside smart rooms has recently attracted much interest in the literature, being the focus of international projects and technology evaluation...
Djamel Mostefa, Nicolas Moreau, Khalid Choukri, Ge...
154
Voted
MEDIAFORENSICS
2010
14 years 11 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain