Sciweavers

8381 search results - page 1622 / 1677
» The security of machine learning
Sort
View
ECCV
2008
Springer
16 years 2 months ago
Cross-View Action Recognition from Temporal Self-similarities
This paper concerns recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such measures ...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...
ICDE
2003
IEEE
160views Database» more  ICDE 2003»
16 years 1 months ago
HD-Eye - Visual Clustering of High dimensional Data
Clustering of large data bases is an important research area with a large variety of applications in the data base context. Missing in most of the research efforts are means for g...
Alexander Hinneburg, Daniel A. Keim, Markus Wawryn...
ICPR
2006
IEEE
16 years 1 months ago
Recognizing Facial Expressions by Tracking Feature Shapes
Reliable facial expression recognition by machine is still a challenging task. We propose a framework to recognise various expressions by tracking facial features. Our method uses...
Atul Kanaujia, Dimitris N. Metaxas
ICPR
2000
IEEE
16 years 1 months ago
General Bias/Variance Decomposition with Target Independent Variance of Error Functions Derived from the Exponential Family of D
An important theoretical tool in machine learning is the bias/variance decomposition of the generalization error. It was introduced for the mean square error in [3]. The bias/vari...
Jakob Vogdrup Hansen, Tom Heskes
121
Voted
SIGSOFT
2009
ACM
16 years 1 months ago
Improving bug triage with bug tossing graphs
A bug report is typically assigned to a single developer who is then responsible for fixing the bug. In Mozilla and Eclipse, between 37%-44% of bug reports are "tossed" ...
Gaeul Jeong, Sunghun Kim, Thomas Zimmermann
« Prev « First page 1622 / 1677 Last » Next »