Sciweavers

1601 search results - page 94 / 321
» Closed Sets for Labeled Data
Sort
View
ICALP
2005
Springer
15 years 10 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
123
Voted
ICDM
2008
IEEE
107views Data Mining» more  ICDM 2008»
15 years 11 months ago
Graph-Based Iterative Hybrid Feature Selection
When the number of labeled examples is limited, traditional supervised feature selection techniques often fail due to sample selection bias or unrepresentative sample problem. To ...
ErHeng Zhong, Sihong Xie, Wei Fan, Jiangtao Ren, J...
147
Voted
ICIP
2002
IEEE
16 years 6 months ago
Packet loss protection of embedded data with fast local search
Unequal loss protection with systematic Reed-Solomon codes allows reliable transmission of embedded multimedia over packet erasure channels. The design of a fast algorithm with lo...
Vladimir Stankovic, Raouf Hamzaoui, Zixiang Xiong
ICCV
2007
IEEE
16 years 6 months ago
Video-based Face Recognition on Real-World Data
In this paper, we present the classification sub-system of a real-time video-based face identification system which recognizes people entering through the door of a laboratory. Si...
Johannes Stallkamp, Hazim Kemal Ekenel, Rainer Sti...
129
Voted
ICML
2003
IEEE
16 years 5 months ago
Learning on the Test Data: Leveraging Unseen Features
This paper addresses the problem of classification in situations where the data distribution is not homogeneous: Data instances might come from different locations or times, and t...
Benjamin Taskar, Ming Fai Wong, Daphne Koller