We prove new results on evasiveness of monotone graph properties by extending the techniques of Kahn, Saks, and Sturtevant [Combinatorica, 4 (1984), pp. 297–306]. For the propert...
We present two methods using mixtures of linear subspaces for face detection in gray level images. One method uses a mixture of factor analyzers to concurrently perform clustering...
Ming-Hsuan Yang, Narendra Ahuja, David J. Kriegman
Abstract—This paper presents results from performance measurements carried out in a Differentiated Services WAN connecting three major cities in Southern Finland. The target of t...
Jarmo Harju, Yevgeni Koucheryavy, Juha Laine, Samp...
When a novice needs help, often the best solution is to find a human expert who is capable of answering the novice’s questions. But often, novices have difficulty characterizing...
In this paper we present a method for the selection of training instances based on the classification accuracy of a SVM classifier. The instances consist of feature vectors repres...
Miguel Lopes, Fabien Gouyon, Alessandro Koerich, L...