Sciweavers

288 search results - page 54 / 58
» Managing iterations with UNICASE
Sort
View
MIR
2005
ACM
140views Multimedia» more  MIR 2005»
14 years 29 days ago
Multiple random walk and its application in content-based image retrieval
In this paper, we propose a transductive learning method for content-based image retrieval: Multiple Random Walk (MRW). Its basic idea is to construct two generative models by mea...
Jingrui He, Hanghang Tong, Mingjing Li, Wei-Ying M...
CCS
2005
ACM
14 years 28 days ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
KDD
2005
ACM
149views Data Mining» more  KDD 2005»
14 years 27 days ago
A distributed learning framework for heterogeneous data sources
We present a probabilistic model-based framework for distributed learning that takes into account privacy restrictions and is applicable to scenarios where the different sites ha...
Srujana Merugu, Joydeep Ghosh
CSCW
2004
ACM
14 years 25 days ago
Lessons from the reMail prototypes
Electronic mail has become the most widely-used application for business productivity and communication, yet many people are frustrated with their email. Though email usage has ch...
Dan Gruen, Steven L. Rohall, Suzanne O. Minassian,...
MM
2004
ACM
86views Multimedia» more  MM 2004»
14 years 24 days ago
Efficient propagation for face annotation in family albums
In this paper, we propose and investigate a new user scenario for face annotation, in which users are allowed to multi-select a group of photographs and assign names to these phot...
Lei Zhang, Yuxiao Hu, Mingjing Li, Wei-Ying Ma, Ho...