Sciweavers

1819 search results - page 278 / 364
» Performance Evaluation of Demodulation Methods: a Combinator...
Sort
View
CVPR
2001
IEEE
16 years 6 months ago
Bayesian Learning of Sparse Classifiers
Bayesian approaches to supervised learning use priors on the classifier parameters. However, few priors aim at achieving "sparse" classifiers, where irrelevant/redundant...
Anil K. Jain, Mário A. T. Figueiredo
CVPR
2007
IEEE
16 years 6 months ago
Real-time Automatic Deceit Detection from Involuntary Facial Expressions
Being the most broadly used tool for deceit measurement, the polygraph is a limited method as it suffers from human operator subjectivity and the fact that target subjects are awa...
Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey ...
CVPR
2007
IEEE
16 years 6 months ago
A Multi-Scale Tikhonov Regularization Scheme for Implicit Surface Modelling
Kernel machines have recently been considered as a promising solution for implicit surface modelling. A key challenge of machine learning solutions is how to fit implicit shape mo...
Jianke Zhu, Steven C. H. Hoi, Michael R. Lyu
ICML
2004
IEEE
16 years 5 months ago
Solving cluster ensemble problems by bipartite graph partitioning
A critical problem in cluster ensemble research is how to combine multiple clusterings to yield a final superior clustering result. Leveraging advanced graph partitioning techniqu...
Xiaoli Zhang Fern, Carla E. Brodley
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
16 years 1 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...