Sciweavers

8381 search results - page 1622 / 1677
» The security of machine learning
Sort
View
89
Voted
ECCV
2008
Springer
16 years 2 days ago
Cross-View Action Recognition from Temporal Self-similarities
This paper concerns recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such measures ...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...
163
Voted
ICDE
2003
IEEE
160views Database» more  ICDE 2003»
15 years 11 months ago
HD-Eye - Visual Clustering of High dimensional Data
Clustering of large data bases is an important research area with a large variety of applications in the data base context. Missing in most of the research efforts are means for g...
Alexander Hinneburg, Daniel A. Keim, Markus Wawryn...
86
Voted
ICPR
2006
IEEE
15 years 11 months ago
Recognizing Facial Expressions by Tracking Feature Shapes
Reliable facial expression recognition by machine is still a challenging task. We propose a framework to recognise various expressions by tracking facial features. Our method uses...
Atul Kanaujia, Dimitris N. Metaxas
78
Voted
ICPR
2000
IEEE
15 years 11 months ago
General Bias/Variance Decomposition with Target Independent Variance of Error Functions Derived from the Exponential Family of D
An important theoretical tool in machine learning is the bias/variance decomposition of the generalization error. It was introduced for the mean square error in [3]. The bias/vari...
Jakob Vogdrup Hansen, Tom Heskes
SIGSOFT
2009
ACM
15 years 11 months ago
Improving bug triage with bug tossing graphs
A bug report is typically assigned to a single developer who is then responsible for fixing the bug. In Mozilla and Eclipse, between 37%-44% of bug reports are "tossed" ...
Gaeul Jeong, Sunghun Kim, Thomas Zimmermann
« Prev « First page 1622 / 1677 Last » Next »