Showing results 2050 to 2069 of 6014
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Semi-supervised bilinear subspace learning Journal:IEEE Transactions on Image Processing | 2009 | ||
Domain transfer SVM for video concept detection Proceeding/Conference:2009 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2009 | 2009 | ||
Domain adaptation from multiple sources via auxiliary classifiers Proceeding/Conference:Proceedings of the 26th International Conference On Machine Learning, ICML 2009 | 2009 | ||
Introduction to computer vision and image understanding the special issue on video analysis Journal:Computer Vision and Image Understanding | 2009 | ||
Introduction to the special issue on Video-based Object and Event Analysis Journal:Pattern Recognition Letters | 2009 | ||
2009 | |||
Preface Journal:Semantic Mining Technologies for Multimedia Databases | 2009 | ||
Spectral embedded clustering Proceeding/Conference:IJCAI International Joint Conference on Artificial Intelligence | 2009 | ||
Concept model-based unsupervised web image re-ranking Proceeding/Conference:Proceedings - International Conference on Image Processing, ICIP | 2009 | ||
Understanding tag-cloud and visual features for better annotation of concepts in NUS-WIDE dataset Proceeding/Conference:1st International Workshop on Web-Scale Multimedia Corpus, WSMC'09, Co-located with the 2009 ACM International Conference on Multimedia, MM'09 | 2009 | ||
Discovering class-specific informative patches and its application in landmark charaterization Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Dual-phase just-in-time workflow scheduling in P2P grid systems Proceeding/Conference:Proceedings of the International Conference on Parallel Processing | 2010 | ||
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Proof-of-knowledge of representation of committed value and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs Journal:ACM Transactions on Information and System Security | 2010 | ||
Dynamic programming based algorithms for set multicover and multiset multicover problems Journal:Theoretical Computer Science | 2010 | ||
Filtering data streams for entity-based continuous queries Journal:IEEE Transactions on Knowledge and Data Engineering | 2010 | ||
Online uniformly inserting points on grid Proceeding/Conference:Lecture Notes in Computer Science | 2010 | ||
Leveraging performance and power savings for embedded systems using multiple target deadlines Proceeding/Conference:Proceedings - International Conference on Quality Software | 2010 | ||
Minimum-latency aggregation scheduling in wireless sensor networks under physical interference model Proceeding/Conference:Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, MSWiM 2010 | 2010 |