Sciweavers

1476 search results - page 260 / 296
» Robust constraint-consistent learning
Sort
View
AVSS
2008
IEEE
13 years 9 months ago
Evaluation of Background Subtraction Algorithms with Post-Processing
Processing a video stream to segment foreground objects from the background is a critical first step in many computer vision applications. Background subtraction (BGS) is a common...
Donovan H. Parks, Sidney Fels
CEAS
2008
Springer
13 years 9 months ago
Filtering Email Spam in the Presence of Noisy User Feedback
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
D. Sculley, Gordon V. Cormack
CIMCA
2006
IEEE
13 years 9 months ago
Identification of Document Language is Not yet a Completely Solved Problem
Existing Language Identification (LID) approaches do reach 100% precision, in most common situations, when dealing with documents written in just one language, and when those docu...
Joaquim Ferreira da Silva, Gabriel Pereira Lopes
COST
2008
Springer
186views Multimedia» more  COST 2008»
13 years 9 months ago
Automatic Motherese Detection for Face-to-Face Interaction Analysis
This paper deals with emotional speech detection in home movies. In this study, we focus on infant-directed speech also called "motherese" which is characterized by highe...
Ammar Mahdhaoui, Mohamed Chetouani, Cong Zong, Raq...
AAAI
2010
13 years 9 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...