Sciweavers

638 search results - page 110 / 128
» Efficient algorithms for evaluating xpath over streams
Sort
View
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
13 years 6 months ago
Clustering Trajectories of Moving Objects in an Uncertain World
Mining Trajectory Databases (TD) has recently gained great interest due to the popularity of tracking devices. On the other hand, the inherent presence of uncertainty in TD (e.g.,...
Nikos Pelekis, Ioannis Kopanakis, Evangelos E. Kot...
JMLR
2010
148views more  JMLR 2010»
13 years 3 months ago
Approximate Inference on Planar Graphs using Loop Calculus and Belief Propagation
We introduce novel results for approximate inference on planar graphical models using the loop calculus framework. The loop calculus (Chertkov and Chernyak, 2006b) allows to expre...
Vicenç Gómez, Hilbert J. Kappen, Mic...
PR
2010
141views more  PR 2010»
13 years 3 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
CVPR
2005
IEEE
14 years 11 months ago
Optimal Sub-Shape Models by Minimum Description Length
Active shape models are a powerful and widely used tool to interpret complex image data. By building models of shape variation they enable search algorithms to use a priori knowle...
Georg Langs, Philipp Peloschek, Horst Bischof
CIKM
2006
Springer
14 years 19 days ago
Distributed spatio-temporal similarity search
In this paper we introduce the distributed spatio-temporal similarity search problem: given a query trajectory Q, we want to find the trajectories that follow a motion similar to ...
Demetrios Zeinalipour-Yazti, Song Lin, Dimitrios G...