Sciweavers

7984 search results - page 1417 / 1597
» Exploring personal information
Sort
View
153
Voted
KDD
2012
ACM
186views Data Mining» more  KDD 2012»
13 years 6 months ago
Maximum inner-product search using cone trees
The problem of efficiently finding the best match for a query in a given set with respect to the Euclidean distance or the cosine similarity has been extensively studied. However...
Parikshit Ram, Alexander G. Gray
155
Voted
CIKM
2007
Springer
15 years 9 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
222
Voted
CORIA
2011
14 years 7 months ago
Mining the Web for lists of Named Entities
Named entities play an important role in Information Extraction. They represent unitary namable information within text. In this work, we focus on groups of named entities of the s...
Arlind Kopliku, Mohand Boughanem, Karen Pinel-Sauv...
ICCV
2009
IEEE
16 years 8 months ago
Poselets: Body Part Detectors Trained Using 3D Human Pose Annotations
We address the classic problems of detection, segmenta- tion and pose estimation of people in images with a novel definition of a part, a poselet. We postulate two criteria (1) ...
Lubomir Bourdev, Jitendra Malik
CVPR
1999
IEEE
16 years 5 months ago
Bayesian Multi-Camera Surveillance
The task of multi-camera surveillance is to reconstruct the paths taken by all moving objects that are temporarily visible from multiple non-overlapping cameras. We present a Baye...
Vera Kettnaker, Ramin Zabih
« Prev « First page 1417 / 1597 Last » Next »