Sciweavers

198 search results - page 13 / 40
» Weak Probabilistic Anonymity
Sort
View
WETICE
2006
IEEE
14 years 3 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
IJCV
2007
196views more  IJCV 2007»
13 years 9 months ago
Weakly Supervised Scale-Invariant Learning of Models for Visual Recognition
We investigate a method for learning object categories in a weakly supervised manner. Given a set of images known to contain the target category from a similar viewpoint, learning...
Robert Fergus, Pietro Perona, Andrew Zisserman
APAL
2004
105views more  APAL 2004»
13 years 9 months ago
Dual weak pigeonhole principle, Boolean complexity, and derandomization
We study the extension (introduced as BT in [5]) of the theory S1 2 by instances of the dual (onto) weak pigeonhole principle for p-time functions, dWPHP(PV )x x2 . We propose a n...
Emil Jerábek
CVPR
2010
IEEE
14 years 2 months ago
Visual Tracking via Weakly Supervised Learning from Multiple Imperfect Oracles
Long-term persistent tracking in ever-changing environments is a challenging task, which often requires addressing difficult object appearance update problems. To solve them, most...
Bineng Zhong, Hongxun Yao, Sheng Chen, Xiaotong Yu...
LREC
2010
116views Education» more  LREC 2010»
13 years 10 months ago
Identifying Sources of Weakness in Syntactic Lexicon Extraction
Previous work has shown that large scale subcategorisation lexicons could be extracted from parsed corpora with reasonably high precision. In this paper, we apply a standard extra...
Claire Gardent, Alejandra Lorenzo