Sciweavers

101 search results - page 9 / 21
» Exploiting the hierarchical structure for link analysis
Sort
View
MM
2005
ACM
140views Multimedia» more  MM 2005»
15 years 5 months ago
Topic transition detection using hierarchical hidden Markov and semi-Markov models
In this paper we introduce a probabilistic framework to exploit hierarchy, structure sharing and duration information for topic transition detection in videos. Our probabilistic d...
Dinh Q. Phung, Thi V. Duong, Svetha Venkatesh, Hun...
DEBS
2010
ACM
15 years 4 months ago
Stochastic performance analysis and capacity planning of publish/subscribe systems
Publish/subscribe systems are used increasingly often as a communication mechanism in loosely-coupled distributed applications. With their gradual adoption in mission critical are...
Arnd Schröter, Gero Mühl, Samuel Kounev,...
MINENET
2006
ACM
15 years 6 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
104
Voted
ICIAR
2007
Springer
15 years 6 months ago
Automatic Closed Edge Detection Using Level Lines Selection
This paper presents a closed edge detection method based on a level lines selection approach. The proposed method is based on an unsupervised probabilistic scheme using an a contra...
Thomas Hurtut, Farida Cheriet
95
Voted
TASLP
2008
143views more  TASLP 2008»
15 years 7 days ago
Strategies to Improve the Robustness of Agglomerative Hierarchical Clustering Under Data Source Variation for Speaker Diarizatio
Many current state-of-the-art speaker diarization systems exploit agglomerative hierarchical clustering (AHC) as their speaker clustering strategy, due to its simple processing str...
K. J. Han, S. Kim, S. S. Narayanan