Sciweavers

186 search results - page 30 / 38
» Learning about Constraints by Reflection
Sort
View
FUIN
2007
147views more  FUIN 2007»
13 years 7 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
ICMLA
2009
13 years 5 months ago
Exploring Scale-Induced Feature Hierarchies in Natural Images
Recently there has been considerable interest in topic models based on the bag-of-features representation of images. The strong independence assumption inherent in the bag-of-feat...
Jukka Perkiö, Tinne Tuytelaars, Wray L. Bunti...
ICASSP
2011
IEEE
12 years 11 months ago
Exploiting active-learning strategies for annotating prosodic events with limited labeled data
Many applications of spoken-language systems can benefit from having access to annotations of prosodic events. Unfortunately, obtaining human annotations of these events, even se...
Raul Fernandez, Bhuvana Ramabhadran
PODS
2008
ACM
174views Database» more  PODS 2008»
14 years 8 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
ICCV
2009
IEEE
13 years 5 months ago
Estimating human shape and pose from a single image
We describe a solution to the challenging problem of estimating human body shape from a single photograph or painting. Our approach computes shape and pose parameters of a 3D huma...
Peng Guan, Alexander Weiss, Alexandru O. Balan, Mi...