Sciweavers

2199 search results - page 405 / 440
» Information retrieval using hierarchical dirichlet processes
Sort
View
CIKM
2010
Springer
13 years 7 months ago
Multi-view clustering with constraint propagation for learning with an incomplete mapping between views
Multi-view learning algorithms typically assume a complete bipartite mapping between the different views in order to exchange information during the learning process. However, ma...
Eric Eaton, Marie desJardins, Sara Jacob
WWW
2005
ACM
14 years 9 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
TOG
2008
236views more  TOG 2008»
13 years 8 months ago
Face swapping: automatically replacing faces in photographs
In this paper, we present a complete system for automatic face replacement in images. Our system uses a large library of face images created automatically by downloading images fr...
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Pete...
ICDE
1999
IEEE
184views Database» more  ICDE 1999»
14 years 9 months ago
Document Warehousing Based on a Multimedia Database System
Nowadays, structured data such as sales and business forms are stored in data warehouses for decision makers to use. Further, unstructured data such as emails, html texts, images,...
Hiroshi Ishikawa, Kazumi Kubota, Yasuo Noguchi, Ko...
GIS
2009
ACM
14 years 9 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku