Sciweavers

2001 search results - page 286 / 401
» Semantic Activity Recognition
Sort
View
CCS
2006
ACM
15 years 5 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
CVPR
2008
IEEE
16 years 3 months ago
Discriminative local binary patterns for human detection in personal album
In recent years, local pattern based object detection and recognition have attracted increasing interest in computer vision research community. However, to our best knowledge no p...
Yadong Mu, Shuicheng Yan, Yi Liu, Thomas S. Huang,...
ECCV
2008
Springer
16 years 3 months ago
Beyond Nouns: Exploiting Prepositions and Comparative Adjectives for Learning Visual Classifiers
Learning visual classifiers for object recognition from weakly labeled data requires determining correspondence between image regions and semantic object classes. Most approaches u...
Abhinav Gupta, Larry S. Davis
WWW
2007
ACM
16 years 2 months ago
Hierarchical, perceptron-like learning for ontology-based information extraction
Recent work on ontology-based Information Extraction (IE) has tried to make use of knowledge from the target ontology in order to improve semantic annotation results. However, ver...
Yaoyong Li, Kalina Bontcheva
138
Voted
CVPR
2010
IEEE
15 years 9 months ago
SPEC Hashing: Similarity Preserving algorithm for Entropy-based Coding
Searching approximate nearest neighbors in large scale high dimensional data set has been a challenging problem. This paper presents a novel and fast algorithm for learning binary...
Ruei-Sung Lin, David Ross, Jay Yagnik