Sciweavers

59 search results - page 7 / 12
» Person Identification using Shadow Analysis
Sort
View
PODS
2007
ACM
203views Database» more  PODS 2007»
14 years 6 months ago
Decision trees for entity identification: approximation algorithms and hardness results
We consider the problem of constructing decision trees for entity identification from a given relational table. The input is a table containing information about a set of entities...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Samb...
CIARP
2007
Springer
13 years 10 months ago
An Analysis of Automatic Gender Classification
Different researches suggest that inner facial features are not the only discriminative features for tasks such as person identification or gender classification. Indeed, they have...
Modesto Castrillón Santana, Quoc C. Vuong
ISWC
2005
IEEE
14 years 8 days ago
Wearable Technology for Crime Scene Investigation
In this paper we report the concept and initial prototype of a device that can be used to support evidence recovery at a crime scene. The key elements are radio frequency identifi...
Chris Baber, Paul Smith, James Cross, Damien Zasik...
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
13 years 10 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
14 years 4 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach