Sciweavers

2027 search results - page 318 / 406
» On Performance Evaluation of Face Detection and Localization...
Sort
View
SIGMOD
2005
ACM
212views Database» more  SIGMOD 2005»
14 years 9 months ago
A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification
Data integrated from multiple sources may contain inconsistencies that violate integrity constraints. The constraint repair problem attempts to find "low cost" changes t...
Philip Bohannon, Michael Flaster, Wenfei Fan, Raje...
CLEAR
2007
Springer
121views Biometrics» more  CLEAR 2007»
14 years 3 months ago
Progress in the AMIDA Speaker Diarization System for Meeting Data
In this paper we describe the AMIDA speaker dizarization system as it was submitted to the NIST Rich Transcription evaluation 2007 for conference room data. This is done in the con...
David A. van Leeuwen, Matej Konecný
IFIP
2007
Springer
14 years 3 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
EDCC
2006
Springer
14 years 22 days ago
Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware
- This paper proposes a novel technique for preventing a wide range of data errors from corrupting the execution of applications. The proposed technique enables automated derivatio...
Karthik Pattabiraman, Giacinto Paolo Saggese, Dani...
IPM
2006
151views more  IPM 2006»
13 years 9 months ago
Document clustering using nonnegative matrix factorization
A methodology for automatically identifying and clustering semantic features or topics in a heterogeneous text collection is presented. Textual data is encoded using a low rank no...
Farial Shahnaz, Michael W. Berry, V. Paul Pauca, R...