Sciweavers

7326 search results - page 1460 / 1466
» Methods for modalities 3
Sort
View
PAMI
2011
13 years 20 days ago
Higher-Dimensional Affine Registration and Vision Applications
—Affine registration has a long and venerable history in computer vision literature, and in particular, extensive work has been done for affine registration in IR2 and IR3 . This...
S. M. Nejhum Shahed, Yu-Tseh Chi, Jeffrey Ho, Ming...
SDM
2011
SIAM
269views Data Mining» more  SDM 2011»
13 years 19 days ago
Semi-Supervised Convolution Graph Kernels for Relation Extraction
Extracting semantic relations between entities is an important step towards automatic text understanding. In this paper, we propose a novel Semi-supervised Convolution Graph Kerne...
Xia Ning, Yanjun Qi
DAGSTUHL
2011
12 years 9 months ago
Feature Extraction for DW-MRI Visualization: The State of the Art and Beyond
By measuring the anisotropic self-diffusion rates of water, Diffusion Weighted Magnetic Resonance Imaging (DW-MRI) provides a unique noninvasive probe of fibrous tissue. In par...
Thomas Schultz
EDM
2011
197views Data Mining» more  EDM 2011»
12 years 9 months ago
Towards Improvements on Domain-independent Measurements for Collaborative Assessment
Assessment on collaborative student behavior is a longstanding issue in user modeling. Nowadays thanks to the proliferation of online learning and the vast amount of data on studen...
Antonio R. Anaya, Jesus Boticario
IACR
2011
89views more  IACR 2011»
12 years 9 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
« Prev « First page 1460 / 1466 Last » Next »