One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?
|
|
- Nancy Johnson
- 6 years ago
- Views:
Transcription
1 One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet, Robert Sabourin One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Guy Lorette Tenth International Workshop on Frontiers in Handwriting Reognition, Ot 2006, La Baule (Frane), Suvisoft, 2006 <inria > HAL Id: inria Submitted on 5 Ot 2006 HAL is a multi-disiplinary open aess arhive for the deposit and dissemination of sientifi researh douments, whether they are published or not The douments may ome from teahing and researh institutions in Frane or abroad, or from publi or private researh enters L arhive ouverte pluridisiplinaire HAL, est destinée au dépôt et à la diffusion de douments sientifiques de niveau reherhe, publiés ou non, émanant des établissements d enseignement et de reherhe français ou étrangers, des laboratoires publis ou privés
2 One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram Mohamed Cheriet Robert Sabourin Éole de Tehnologie Supérieure, Montréal, Canada milgram@liviaetsmtla mohamedheriet@etsmtla robertsabourin@etsmtla Abstrat The one against one and the one against all are the two most popular strategies for multi-lass SVM; however, aording to the literature review, it seems impossible to onlude whih one is better for handwriting reognition Thus, we ompared these two lassial strategies on two different handwritten harater reognition problems Several post-proessing methods for estimating posterior probability were also evaluated and the results were ompared with the ones obtained using MLP Finally, the one against all strategy appears signifiantly more aurate for digit reognition, while the differene between the two strategies is muh less obvious with upper-ase letters Besides, the one against one strategy is substantially faster to train and seems preferable for problems with a very large number of lasses To onlude, SVMs allow signifiantly better estimation of probabilities than MLP, whih is promising from the point of view of their inorporation into handwriting reognition systems Keywords: Support Vetor Mahine (SVM), Multi-lass Classifiation, Posterior Probability Estimation 1 Introdution In the 1990s, a new type of learning algorithm was developed: the Support Vetor Mahine (SVM) As shown in the Burges tutorial [1], SVM has several interesting properties for pattern reognition Moreover, thanks to improved omputing power and the development of fast learning algorithms, it is now possible to train SVM in real-world appliations However, although SVM has attrated a great deal of attention in the mahine learning ommunity, the multilass SVM is still an ongoing researh issue The existing methods an roughly be divided between two different approahes: the single mahine approah, whih attempts to onstrut a multi-lass SVM by solving a single optimization problem, and the divide and onquer approah, whih deomposes the multilass problem into several binary sub-problems, and builds a standard SVM for eah The most popular deomposing strategy is probably the one against all, whih onsists of building one SVM per lass, trained to distinguish the samples in a single lass from the samples in all remaining lasses Another popular strategy is the one against one, whih builds one SVM for eah pair of lasses On the other hand, more omplex deomposition shemes based on error orreting output odes (ECOC) have been introdued by Diettrih & Bakiri [2] and more reently extended by Allwein et al [3] A omparison of several multi-lass SVM methods (2 single mahine and 3 divide and onquer ) has been realized by Hsu & Lin [4] The results observed are very similar; however, the authors onlude that one against one is more pratial, beause the training proess is quiker Moreover, as to the laim put forward by Allwein et al [3] that one against one and other ECOC are more aurate than the one against all strategy, Rifkin & Klautau [5] disagree, arguing that the one against all strategy is as aurate as any other approah, assuming that the SVMs are well tuned Thus, aording to the literature review, it seems impossible to onlude whih multi-lass SVM is better for handwriting reognition For this reason, we hose to ompare the two most popular strategies, whih are one against all and one against one On the other hand, generally in handwriting reognition appliations, the lassifier only ontributes to a small part of the final deision It is essential, then, that the output of the lassifier is a alibrated onfidene measure, like posterior probability However, although standard SVMs do not provide suh probabilities, a simple post-proessing method for mapping the outputs of a single SVM into posterior probabilities has been proposed by Platt [6] and improved by Lin et al [7] Moreover, while many methods for estimating probabilities with the one against one strategy have been proposed [8, 9, 10], probability estimation with the one against all strategy has not, to the best of our knowledge, been studied The likely reason for this is that, with this strategy, mapping the outputs of eah SVM separately seems suffiient for estimating multilass probabilities; but, as we will see, this is not neessarily the best solution The remainder of this paper is organized as follows Setion 2 presents our experimental protool (database, baseline lassifier, and omparison riteria) Setion 3 desribes the one against all strategy, and ompares two post-proessing methods to estimate posterior probability Setion 4 desribes the one against one strategy, and ompares three methods for ombining the probabilities by eah SVM Finally, setion 5 ompares the two strategies in terms of omplexity and auray, and setion 6 onludes with some pratial suggestions
3 2 Experimental Protool The experiments were onduted on a personal omputer with 19 GHz CPU and 1 Go of RAM All the SVMs were trained with the LIBSVM software [11] We used the C-SVM with a Gaussian kernel The kernel parameter γ and the regularization parameter C were empirially optimized by minimizing the on the validation dataset 21 Database We used the NIST-SD19 database [12], whih ontains the full-page binary images of Handprinted Sample Forms (HSF) from 3,600 writers In our experiments, we used only the images of isolated handwritten digits and upperase letters The number of samples in eah dataset is reported in Table 1 The training datasets ontain exatly the same number of examples in eah lass, whih are the first images from the hsf_{0,1,2,3} orpus The validation datasets are omposed of the remaining images from hsf_{0,1,2,3} for the digit database and of all images from the hsf_4 orpus for the letter database Finally, the testing datasets are omposed of all the images from the hsf_7 orpus Table 1 Number of samples in eah dataset Digit Letter Training 195,000 43,160 Validation 28,123 11,941 Testing 60,089 12,092 We hose to use the same feature extration proedure as Oliveira et al [13] Indeed, this feature spae has been used on the same digit dataset and made it possible to obtain an aurate lassifiation Aording to this method, eah image is divided into six zones: 3 rows and 2 olumns In eah zone, 22 omponents are extrated: 13 onavity measures, 8 orresponding to the histogram of the ontour diretions and one related to the surfae of the harater Finally, we obtained 132 disriminative features, normalized to between 0 and 1 22 Baseline Classifier We have eleted to use a Multi-Layer Pereptron (MLP) as the baseline lassifier beause this type of artifiial neural network makes it possible to estimate aurate posterior probabilities and has been widely inorporated into handwriting reognition systems For our experimentation, we used the same type of topology as Oliveira et al [13], in whih an MLP is used for reognizing handwritten numerial strings The network used has one hidden layer The neurons of the input and the output layers are fully onneted to the neurons of the hidden layer, and the transfer funtion is the sigmoid funtion Furthermore, the network is trained with a sequential gradient desent with momentum applied to a sum-of-squares error funtion The s obtained with MLP are reported in Table 2 and ompared with another lassial lassifier: the k-nearest Neighbor Table 2 Error rate obtained on the testing dataset Digit Letter k-nn 135% 760% MLP 080% 381% Let us note that the number of hidden neurons (h = 80 for digit, and h = 100 for letter) and the number of neighbors (k = 1 for digit, and k = 3 for letter) are fixed using the validation dataset 23 Comparison Criteria To ompare the different approahes in terms of auray, the simplest way would be to evaluate the on the testing dataset, but this value is often not aurate enough For this reason, an error funtion is generally used for omparing the various probability estimates We hose to use the negative log-likelihood: n log ˆP ( k x k ), (1) k=1 where k denotes the label of the sample x k In addition, we propose to use a third measure based on the rejet option Indeed, if the posterior probabilities of the data lasses are known exatly, then, as Chow demonstrated in [14], the optimal rejet option is to rejet a sample x if: max ( P( j x) ) < T (2) j =1,, Then, the threshold T defines the rate of samples rejeted and onsequently the among the samples aepted Thus, a omplete desription of reognition performane is given by the error-rejet tradeoff, whih is obtained by varying T An example is shown in Figure 1 However, in real appliations, suh probabilities are affeted by signifiant estimate errors, and the better the probabilities estimate is, the better the error-rejet tradeoff is Thus, we propose to evaluate the rejetion rate neessary to derease the to a speifi value (01% for digits and 05% for letters) Figure 1: Error-rejet tradeoff obtained with the baseline lassifier on the digit dataset
4 3 The One Against All Strategy 31 Desription The one against all strategy onsists of onstruting one SVM per lass, whih is trained to distinguish the samples of one lass from the samples of all remaining lasses Usually, lassifiation of an unknown pattern is done aording to the maximum output among all SVMs 32 Probability Estimation The most intuitive approah to estimate posterior probability with the one against all strategy is to separately map the outputs of eah SVM into probability using the method proposed by Platt [6], whih onsist of using an additional sigmoid: 1 ˆP ( j f j ) = 1+ exp A j f j + B j, (3) where f j denotes the output of the SVM trained to separate the lass j from all the others Then, for eah sigmoid the parameters A j and B j are optimized by minimizing the loal negative log-likelihood: n t k log( p k ) + ( 1 t k )log( 1 p k ), (4) k=1 where, p k denotes the output of the sigmoid and t k the probability target To solve this optimization problem, Platt [6] proposes using a model-trust minimization algorithm based on the Levenberg-Marquardt algorithm However, Lin et al [7] showed that there are some problems with this algorithm and propose using another minimization algorithm based on Newton s method with baktraking line searh However, nothing guarantees that: ˆP j f j = 1 (5) j=1 For this reason, it seems preferable to normalize the probabilities as follows: ˆP ˆP ( j x) ( j f j ) = (6) ˆP j ' f j ' j '=1 Another approah to estimate posterior probability with the one against all strategy would be to exploit the outputs of all SVMs to estimate overall probabilities In order to do this, we propose using the softmax funtion, whih an be regarded as a generalization of the sigmoid funtion for the multi-lass ase Thus, in the same spirit as Platt s algorithm, we use a parametri form of the softmax funtion: exp( A j f j ( x) + B j ) ˆP( j x) =, (7) exp A j ' f j ' x j '=1 ( + B j ' ) and derive the parameters A j and B j by minimizing the global negative log-likelihood (Eq 1) Thus, it is neessary to onstrut a dataset of SVM outputs, whih will be used to fix the parameters of sigmoid and softmax funtions The easiest way to do this is to use the same training samples used to fit SVMs; but, as pointed out by Platt [6], using the same data twie, an sometimes lead to a disastrously biased estimate Therefore, it is preferable to derive an unbiased training set of the SVM outputs A first solution would be to use a validation dataset; but, in our ase, the number of samples in eah lass is not proportional to the prior probability For this reason, it seems preferable to use ross-validation Then, the training dataset was split into four parts Eah of four SVMs is trained on permutations of three out of four parts, and the SVM outputs are evaluated on the remaining fourth part Finally, the union of all four sets of SVM outputs forms an unbiased dataset, whih an be used to fix the parameters of funtions Furthermore, one the parameters are fixed, the final SVM is trained on the entire training set 33 Experimental Results Firstly, we tested the one against all strategy with the lassial deision making, whih diretly exploits the SVM outputs The s obtained on the testing datasets are 063% with digits and 324% with letters Thereafter, we implemented the two approahes for mapping the SVM outputs into probabilities The results obtained on the testing dataset are reported in Table 3 and Table 4 Considering these results, a number of remarks an be derived First, the two post-proessing methods allow a slight redution of the on the letter dataset, while no improvement is observed on the digit dataset Seond, as we thought, the is not aurate enough in omparing the various estimates Indeed, while the s obtained with the two methods are similar, the rejetion rates and the negative log-likelihood () are signifiantly different Finally, it appears that it is better for posterior probability estimation to optimize globally a softmax funtion than loally several sigmoid funtions Table 3 Results obtained with the one against all strategy on the digit dataset - no rejetion - rejetion rate - 01% of error - sigmoid 064% 373% 1,517 softmax 063% 230% 1,310 Table 4 Results obtained with the one against all strategy on the letter dataset - no rejetion - rejetion rate - 05% of error - sigmoid 317% 1317% 1,570 softmax 318% 1007% 1,375
5 4 The One Against One Strategy 41 Desription The one against one strategy, also known as pairwise oupling, all pairs or round robin, onsists in onstruting one SVM for eah pair of lasses Thus, for a problem with lasses, (-1)/2 SVMs are trained to distinguish the samples of one lass from the samples of another lass Usually, lassifiation of an unknown pattern is done aording to the maximum voting, where eah SVM votes for one lass 42 Probability Estimation After mapping the output of eah SVM into probability with a sigmoid funtion, the task is to express the global posterior probabilities ˆP( j x) as funtions of the loal posterior probabilities, ˆP j where f j, j ' denotes the output of the SVM trained to distinguish lass ω j from lass ω j Various methods have been proposed in the literature We hose to ompare three of these: Method 1 Prie et al [8] onsidered that for all lasses j : P( j, j ' x) ( 2)P( j x) = 1, (8) j '=1, j ' j where j, j ' denotes the union of lasses j and j ' Then, using: P( j x) ˆP j P( j, j ' x), (9) it is possible to derive the following expression: 1 ˆP( j x) = 1 j'=1, j' j ˆP j f j, j' 2 (10) However, sine nothing guarantees that the sum of all the probabilities is 1, we must divide eah estimate ˆP( j x) by ˆP( j x) Method 2 j=1 In a different way, Hastie & Tibshirani [9] proposed using an iterative algorithm to estimate the posterior probabilities = ˆP( j x), whih minimizes the Kullbak-Leibler distane between r jj ' = ˆP j and µ jj ' = + ', that is: n jj ' r jj ' log r jj ' + (1 r jj ' )log 1 r jj ' µ jj ' 1 µ, (11) j< j ' jj ' where n jj ' denotes the number of training samples in the lasses j and j ' To this end, they start with simple non-iterative estimates: j = 2 ( + 1) r jj ' j '=1, j '" j µ, (12) and repeat ( j = 1, 2,,,1, ) until onvergene: 1 µ jj ' + ', j ' j 2! 3 p j '=1 j ' j '=1, j ' j j '=1, j ' j n jj ' r jj ' n jj ' µ jj ' In pratie, we used the following stopping ondition: ( (t) + (t + 1) ) , (13) j=1 where (t) denotes the atual values of and (t 1) the previous values of Method 3 More reently, Hamamura et al [10] proposed a ombination based on the assumption that disriminant funtions are independent of one another Then, sine prior probabilities are all the same, posterior probabilities an be estimated by: ˆP( j x) = j '=1, j ' j j ''=1 j '=1, j ' j '' 43 Experimental Results ˆP j ˆP ( j '' f j '', j ' ) (14) Firstly, we tested the one against one strategy with the lassial voting rule The s obtained on the testing datasets are 071% with digits and 329% with letters Thereafter, we implemented the three methods for ombining probabilities The results obtained on the testing dataset are reported in Table 5 and Table 6 Considering these results, two remarks an be made First, the last method is less aurate than the first two, whih yield signifiantly better rejetion rates and negative log-likelihoods on the two datasets Seond, although the results obtained with the first two methods are omparable, the first method seems slightly more aurate than the seond Indeed, the first method yields better on the letter dataset and better negative log-likelihoods on the two datasets Moreover, the first method has the advantage of being non-iterative and is thus faster than the seond method
6 Table 5 Results obtained with the one against one strategy on the digit dataset - no rejetion - rejetion rate - 01% of error - method 1 070% 349% 1,483 method 2 069% 337% 1,604 method 3 070% 431% 1,825 Table 8 Comparison in terms of auray on the letter dataset - no rejetion - rejetion rate - 05% of error - MLP 381% 2283% 2,923 SVM - OAO 322% 1122% 1,421 SVM - OAA 318% 1007% 1,375 Table 6 Results obtained with the one against one strategy on the letter dataset - no rejetion - rejetion rate - 05% of error - method 1 322% 1122% 1,421 method 2 337% 1136% 1,548 method 3 329% 1389% 2,197 5 Comparison of the two strategies We an now try to answer to the question raised in our title With this in mind, we ompared the two strategies in terms of auray, but also in terms of omplexity 51 Comparison in terms of auray The results obtained on the testing dataset are reported in Table 7 and Table 8, and the error-rejet tradeoffs are shown in Figure 2 and Figure 3 Conerning the one against all strategy (OAA) the softmax funtion is used for probability estimation, while the method 1 is used for ombining the probabilities of the one against one strategy (OAO) Table 7 Comparison in terms of auray on the digit dataset - no rejetion - rejetion rate - 01% of error - MLP 080% 630% 2,591 SVM - OAO 070% 349% 1,483 SVM - OAA 063% 230% 1,310 Figure 2: Comparison of the error-rejet tradeoff obtained on the digit dataset Figure 3: Comparison of the error-rejet tradeoff obtained on the letter dataset Considering these results, two onlusions an be made First, in agreement with the literature, SVMs allow more aurate lassifiation than a lassial MLP Seond, in disagreement with Allwein et al [3], in our experiments, the one against all strategy is more aurate than the one against one Indeed, if the differene between the two strategies is small on the letter dataset, it is signifiant on the digit dataset 52 Comparison in terms of omplexity Two types of omplexity must be onsidered: The omplexity of the training proess It an seem logial that the total training time with the one against one strategy is larger than with the one against all, beause it is neessary to train more binary lassifiers; but it is not true when the binary lassifiers are SVMs Indeed, the training time of an SVM inreases more than linearly with the number of training samples Thus, sine eah sub-problem involves a small number of training samples and is easier to solve, it is quiker to train the (-1)/2 SVMs of the one against one strategy than the SVMs of the one against all strategy In ours experiments, the total training time is approximately divided by 12 with letters (see Table 9) and by 50 with digits (see Table 10) The omplexity of the deision making proess Again, it an seem logial that the deision making with the one against one strategy is more omplex than with the one against all, beause it is neessary to evaluate more deision funtions; but, as previously, it is not neessarily true with SVMs Indeed, the omplexity of an SVM s deision making is diretly linked to the
7 number of support vetors (SVs), and although the deision making is more ompliated in the multi-lass ase, it is reasonable to onsider that the omplexity is proportional to the total number of support vetors 1 However, in our experiments the one against all strategy uses more support vetors than the one against one (48% more for digits, and 21% more for letters) Table 9 Comparison of the two strategies in terms of omplexity on the digit dataset OAO OAA number of SVMs total training time 36 min 32 h 17 number of SVs 5,753 8,514 Table 10 Comparison of the two strategies in terms of omplexity on the letter dataset OAO OAA number of SVMs total training time 4 min 51 min number of SVs 9,152 11,109 6 Conlusion Finally, our answer to the title question will depend on what the problem is! Indeed, it is not reasonable to laim that one strategy is always better that the other; but aording to the appliation onstraints, the number of lasses, and the number of training samples, it will be one or the other of the two strategies that will be more suitable to solve the lassifiation problem Thus, onsidering the onlusions of the previous setion, some suggestions an be made as to whih strategy is best for a speifi problem For problems with few lasses, like digit reognition, the one against all strategy seems signifiantly more aurate; while for problems with more lasses, like Latin letter reognition, the differene of auray between the two strategies seems muh less signifiant Lastly, for problems with a very large number of lasses, like Chinese or Japanese ideogram reognition, we suspet that the unbalane of the number of the samples auses problem with the one against all strategy, espeially when it has few training samples per lass Moreover, the one against one strategy, whih is more modular, is more suitable for speeding up the deision making proess by ombining with other lassifiers [15] Furthermore, if the number of training samples is very large, the training time an 1 Notes that in the multi-lass ase, the total number of support vetors is not neessarily equal to the sum of the number of support vetors of eah SVM, beause a training sample an be a support vetor for several SVMs beome problemati, and then the one against one strategy appears more suitable for pratial use To onlude, we have shown in this paper that appropriate post-proessing make it possible to estimate aurate posterior probabilities with SVMs Thus, these promising results open the way to new perspetives with respet to inorporating SVMs into handwriting reognition systems Referenes [1] CJC Burges, "A tutorial on support vetor mahines for pattern reognition", Data Mining and Knowledge Disovery, vol 2, pp , 1998 [2] TG Dietterih and G Bakiri, "Solving Multilass Learning Problems via Error-Correting Output Codes", Journal of Artifiial Intelligene Researh, vol 2, pp , 1995 [3] EL Allwein, RE Shapire, and Y Singer, "Reduing Multilass to Binary: A Unifying Approah for Margin Classifiers", Journal of Mahine Learning Researh, vol 1, pp , 2000 [4] C-W Hsu and C-J Lin, "A omparison of methods for multi-lass support vetor mahines", IEEE transations on Neural Networks, vol 13, pp , 2002 [5] R Rifkin and A Klautau, "In defene of one-vs-all lassifiation", Journal of Mahine Learning Researh, vol 5, pp , 2004 [6] JC Platt, "Probabilities for SV Mahines", in Advanes in Large Margin Classifiers, A Smola, P Bartlett, B Shölkopf, and D Shuurmans, Eds, MIT Press, pp 61-74, 1999 [7] H-T Lin, C-J Lin, and RC Weng, "A note on Platt's probabilisti outputs for support vetor mahines", Tehnial Report, National Taiwan University, 2003 [8] D Prie, S Knerr, L Personnaz, and G Dreyfus, "Pairwise Neural Network Classifiers with Probabilisti Outputs", in Neural Information Proessing Systems, MIT Press, pp , 1995 [9] T Hastie and R Tibshirani, "Classifiation by pairwise oupling", The Annals of Statistis, vol 26, pp , 1998 [10] T Hamamura, H Mizutani, and B Irie, "A multilass lassifiation method based on multiple pairwise lassifiers", International Conferene on Doument Analysis and Reognition, pp , Edinburgh, Sotland, August 3-6, 2003 [11] C-C Chang and C-J Lin, "LIBSVM: a library for support vetor mahines", Tehnial Report, National Taiwan University, 2001 [12] PJ Grother, "NIST Speial Database 19-Handprinted Forms and Charaters Database", Tehnial Report, National Institute of Standards and Tehnology, 1995 [13] LS Oliveira, R Sabourin, F Bortolozzi, and CY Suen, "Automati reognition of handwritten numerial strings: a reognition and verifiation strategy", IEEE Transations on Pattern Analysis and Mahine Intelligene, vol 24, pp , 2002 [14] CK Chow, "On optimum reognition error and rejet tradeoff", IEEE Transations on Information Theory, vol 16, pp 41-46, 1970 [15] J Milgram, M Cheriet, and R Sabourin, "Speeding Up the Deision Making of Support Vetor Classifiers", International Workshop on Frontiers in Handwriting Reognition, pp 57-62, Tokyo, Japan, Otober 26-29, 2004
The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationA Coarse-to-Fine Classification Scheme for Facial Expression Recognition
A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationEvolutionary Feature Synthesis for Image Databases
Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationKERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION
KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationExploiting Enriched Contextual Information for Mobile App Classification
Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More informationGradient based progressive probabilistic Hough transform
Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationDetecting Outliers in High-Dimensional Datasets with Mixed Attributes
Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More information3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?
3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg
More informationPlot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar
Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More information2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationModel Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology
The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationWe P9 16 Eigenray Tracing in 3D Heterogeneous Media
We P9 Eigenray Traing in 3D Heterogeneous Media Z. Koren* (Emerson), I. Ravve (Emerson) Summary Conventional two-point ray traing in a general 3D heterogeneous medium is normally performed by a shooting
More informationWeak Dependence on Initialization in Mixture of Linear Regressions
Proeedings of the International MultiConferene of Engineers and Computer Sientists 8 Vol I IMECS 8, Marh -6, 8, Hong Kong Weak Dependene on Initialization in Mixture of Linear Regressions Ryohei Nakano
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More information特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing
デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationTUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM
TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information
More informationA Unified Subdivision Scheme for Polygonal Modeling
EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.
More informationAnalysis of input and output configurations for use in four-valued CCD programmable logic arrays
nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,
More informationNaïve Bayesian Rough Sets Under Fuzziness
IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationAdapting K-Medians to Generate Normalized Cluster Centers
Adapting -Medians to Generate Normalized Cluster Centers Benamin J. Anderson, Deborah S. Gross, David R. Musiant Anna M. Ritz, Thomas G. Smith, Leah E. Steinberg Carleton College andersbe@gmail.om, {dgross,
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationSpatial-Aware Collaborative Representation for Hyperspectral Remote Sensing Image Classification
Spatial-Aware Collaborative Representation for Hyperspetral Remote Sensing Image ifiation Junjun Jiang, Member, IEEE, Chen Chen, Member, IEEE, Yi Yu, Xinwei Jiang, and Jiayi Ma Member, IEEE Representation-residual
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationA New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification
A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia
More informationSelf-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization
Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in
More informationHyperspectral Images Classification Using Energy Profiles of Spatial and Spectral Features
journal homepage: www.elsevier.om Hyperspetral Images Classifiation Using Energy Profiles of Spatial and Spetral Features Hamid Reza Shahdoosti a a Hamedan University of ehnology, Department of Eletrial
More informationDeep Rule-Based Classifier with Human-level Performance and Characteristics
Deep Rule-Based Classifier with Human-level Performane and Charateristis Plamen P. Angelov 1,2 and Xiaowei Gu 1* 1 Shool of Computing and Communiations, Lanaster University, Lanaster, LA1 4WA, UK 2 Tehnial
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More information3D Model Based Pose Estimation For Omnidirectional Stereovision
3D Model Based Pose Estimation For Omnidiretional Stereovision Guillaume Caron, Eri Marhand and El Mustapha Mouaddib Abstrat Robot vision has a lot to win as well with wide field of view indued by atadioptri
More informationMulti-modal Clustering for Multimedia Collections
Multi-modal Clustering for Multimedia Colletions Ron Bekkerman and Jiwoon Jeon Center for Intelligent Information Retrieval University of Massahusetts at Amherst, USA {ronb jeon}@s.umass.edu Abstrat Most
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationWe don t need no generation - a practical approach to sliding window RLNC
We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationThe Implementation of RRTs for a Remote-Controlled Mobile Robot
ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationThe HuMAnS toolbox, a homogenous framework for motion capture, analysis and simulation
The HuMAnS toolbox, a homogenous framework for motion apture, analysis and simulation Pierre-Brie Wieber, Florene Billet, Laurene Boissieux, Roger Pissard-Gibollet To ite this version: Pierre-Brie Wieber,
More informationMicro-Doppler Based Human-Robot Classification Using Ensemble and Deep Learning Approaches
Miro-Doppler Based Human-Robot Classifiation Using Ensemble and Deep Learning Approahes Sherif Abdulatif, Qian Wei, Fady Aziz, Bernhard Kleiner, Urs Shneider Department of Biomehatroni Systems, Fraunhofer
More informationSequential Incremental-Value Auctions
Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the
More informationParametric Abstract Domains for Shape Analysis
Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationDiscrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging
0-708: Probabilisti Graphial Models 0-708, Spring 204 Disrete sequential models and CRFs Leturer: Eri P. Xing Sribes: Pankesh Bamotra, Xuanhong Li Case Study: Supervised Part-of-Speeh Tagging The supervised
More informationExpert Systems with Applications
Expert Systems with Appliations 39 (2012) 2842 2855 Contents lists available at SiVerse SieneDiret Expert Systems with Appliations journal homepage: www.elsevier.om/loate/eswa An automated vision system
More informationHello neighbor: accurate object retrieval with k-reciprocal nearest neighbors
Hello neighbor: aurate objet retrieval with -reiproal nearest neighbors Danfeng Qin Stephan Gammeter Luas Bossard Till Qua,2 Lu van Gool,3 ETH Zürih 2 Kooaba AG 3 K.U. Leuven {ind,gammeter,bossard,tua,vangool}@vision.ee.ethz.h
More informationDiffusion Kernels on Graphs and Other Discrete Structures
Diffusion Kernels on Graphs and Other Disrete Strutures Risi Imre Kondor ohn Lafferty Shool of Computer Siene Carnegie Mellon University Pittsburgh P 523 US KONDOR@CMUEDU LFFERTY@CSCMUEDU bstrat The appliation
More informationImplementing Load-Balanced Switches With Fat-Tree Networks
Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations
More informationFace and Facial Feature Tracking for Natural Human-Computer Interface
Fae and Faial Feature Traking for Natural Human-Computer Interfae Vladimir Vezhnevets Graphis & Media Laboratory, Dept. of Applied Mathematis and Computer Siene of Mosow State University Mosow, Russia
More informationFOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW
FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationRotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors
Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,
More informationTest Case Generation from UML State Machines
Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864
More informationNaïve Bayes Slides are adapted from Sebastian Thrun (Udacity ), Ke Chen Jonathan Huang and H. Witten s and E. Frank s Data Mining and Jeremy Wyatt,
Naïve Bayes Slides are adapted from Sebastian Thrun (Udaity ), Ke Chen Jonathan Huang and H. Witten s and E. Frank s Data Mining and Jeremy Wyatt, Bakground There are three methods to establish a lassifier
More informationContour Box: Rejecting Object Proposals Without Explicit Closed Contours
Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University
More informationParallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup
Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationINTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING
INTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING Fadi Bayoud, Jan Skaloud, Bertrand Merminod Eole Polytehnique Fédérale de Lausanne (EPFL) Geodeti Engineering Laoratory
More informationShape Outlier Detection Using Pose Preserving Dynamic Shape Models
Shape Outlier Detetion Using Pose Preserving Dynami Shape Models Chan-Su Lee Ahmed Elgammal Department of Computer Siene, Rutgers University, Pisataway, NJ 8854 USA CHANSU@CS.RUTGERS.EDU ELGAMMAL@CS.RUTGERS.EDU
More informationContents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8
Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4
More informationFUZZY WATERSHED FOR IMAGE SEGMENTATION
FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The
More informationVisualization of patent analysis for emerging technology
Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young
More informationPlumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies
ACM Symposium on Solid Modeling and Appliations (2004) P. Brunet, N. Patrikalakis (Editors) Plumber: a method for a multi-sale deomposition of 3D shapes into tubular primitives and bodies M. Mortara G.
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationSemi-Supervised Affinity Propagation with Instance-Level Constraints
Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,
More informationChemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment
hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology
More informationSimulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects
Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,
More informationAdaptive Implicit Surface Polygonization using Marching Triangles
Volume 20 (2001), Number 2 pp. 67 80 Adaptive Impliit Surfae Polygonization using Marhing Triangles Samir Akkouhe Eri Galin L.I.G.I.M L.I.G.I.M Eole Centrale de Lyon Université Claude Bernard Lyon 1 B.P.
More informationIntroductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test
Introdutory Programming, IMM, DTU Systemati Software Test Peter Sestoft a Programs often ontain unintended errors how do you find them? Strutural test Funtional test Notes: Systemati Software Test, http://www.dina.kvl.dk/
More information