Abstract. This paper evaluates strategies to combine multiple segmentations of the same image, generated for example by different segmentation methods or by different human experts...
Torsten Rohlfing, Daniel B. Russakoff, Calvin R. M...
In many application domains there is a large amount of unlabeled data but only a very limited amount of labeled training data. One general approach that has been explored for util...
Avrim Blum, John D. Lafferty, Mugizi Robert Rweban...
We present a new bicriteria approximation algorithm for the degree-bounded minimum-cost spanning tree problem: Given an undirected graph with nonnegative edge weights and degree b...
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Boundary and virtual organisation theory were used to study the implications of organisation level virtualisation for work units. A single case study in a geographically dispersed...