Sciweavers

2131 search results - page 29 / 427
» Immunity for Closed Sets
Sort
View
123
Voted
ML
2010
ACM
210views Machine Learning» more  ML 2010»
14 years 11 months ago
Mining frequent closed rooted trees
Many knowledge representation mechanisms are based on tree-like structures, thus symbolizing the fact that certain pieces of information are related in one sense or another. There ...
José L. Balcázar, Albert Bifet, Anto...
157
Voted
ICIP
2009
IEEE
14 years 11 months ago
Automatic closed eye correction
On a large group picture, having all people open their eyes can turn out to be a difficult task for photographers. Therefore, in this paper, we describe an original method to auto...
Jean Charles Bazin, Dang-Quang Pham, Inso Kweon, K...
369
Voted
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
17 years 26 days ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
111
Voted
ECCV
2008
Springer
16 years 3 months ago
Closed-Form Solution to Non-rigid 3D Surface Registration
Abstract. We present a closed-form solution to the problem of recovering the 3D shape of a non-rigid inelastic surface from 3D-to-2D correspondences. This lets us detect and recons...
Mathieu Salzmann, Francesc Moreno-Noguer, Vincent ...
103
Voted
ICIP
2001
IEEE
16 years 2 months ago
Closed surface reconstruction in X-ray tomography
We study the 3D reconstruction of a binary scene from X-ray tomographic data. In the special case of a compact and uniform object lying in a uniform background, the scene is entir...
Ali Mohammad-Djafari, Charles Soussen