Sciweavers

1004 search results - page 159 / 201
» Safe Constraint Queries
Sort
View
ICIP
2009
IEEE
13 years 6 months ago
Content-based image retrieval: An application to tattoo images
Tattoo images on human body have been routinely collected and used in law enforcement to assist in suspect and victim identification. However, the current practice of matching tat...
Anil K. Jain, Jung-Eun Lee, Rong Jin, Nicholas Gre...
CVPR
2011
IEEE
13 years 13 days ago
How does Person Identity Recognition Help Multi-Person Tracking?
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Cheng-Hao Kuo, Ram Nevatia
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
14 years 10 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
GIS
2009
ACM
14 years 9 months ago
An Interactive Approach to Route Search
A route leads from a start location to a final destination and passes through geospatial entities that are picked according to search terms provided by the user. Each entity is pe...
Yaron Kanza, Roy Levin, Eliyahu Safra, Yehoshua Sa...
GIS
2004
ACM
14 years 9 months ago
Energy efficient exact kNN search in wireless broadcast environments
The advances in wireless communication and decreasing costs of mobile devices have enabled users to access desired information at any time. Coupled with positioning technologies l...
Bugra Gedik, Aameek Singh, Ling Liu