Sciweavers

194 search results - page 30 / 39
» Learning whom to trust: using graphical models for learning ...
Sort
View
CVPR
2008
IEEE
14 years 9 months ago
Clothing cosegmentation for recognizing people
Reseachers have verified that clothing provides information about the identity of the individual. To extract features from the clothing, the clothing region first must be localize...
Andrew C. Gallagher, Tsuhan Chen
KDD
2004
ACM
116views Data Mining» more  KDD 2004»
14 years 23 days ago
A system for automated mapping of bill-of-materials part numbers
Part numbers are widely used within an enterprise throughout the manufacturing process. The point of entry of such part numbers into this process is normally via a Bill of Materia...
Jayant Kalagnanam, Moninder Singh, Sudhir Verma, M...
CVPR
2004
IEEE
14 years 9 months ago
Tracking Loose-Limbed People
We pose the problem of 3D human tracking as one of inference in a graphical model. Unlike traditional kinematic tree representations, our model of the body is a collection of loos...
Leonid Sigal, Sidharth Bhatia, Stefan Roth, Michae...
KDD
2008
ACM
178views Data Mining» more  KDD 2008»
14 years 7 months ago
Training structural svms with kernels using sampled cuts
Discriminative training for structured outputs has found increasing applications in areas such as natural language processing, bioinformatics, information retrieval, and computer ...
Chun-Nam John Yu, Thorsten Joachims
ICETE
2004
253views Business» more  ICETE 2004»
13 years 8 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong