Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Services Computing (7)
- AUTISM (2)
- Documentation (2)
- Information Security (2)
- Net-Centric Collaboration (2)
-
- Privacy (2)
- Web services (2)
- AspectC++ (1)
- Abstraction (1)
- Algorithms (1)
- Articles (1)
- Aspect-oriented programming (1)
- Australia (1)
- BPART (1)
- Bayesian (1)
- Bayesian Networks (1)
- Bayesian networks (1)
- Bi-level clustering (1)
- Bioinformatics (1)
- Biomedical data sets (1)
- Board games (1)
- Book Alignment (1)
- Categorical (1)
- Collaboration (1)
- Collaborative Information Systems (1)
- Collaborative games (1)
- Component (1)
- Computer games (1)
- Computer science (1)
- Computer skills (1)
- Publication
-
- Jia Zhang (9)
- Erik G Learned-Miller (7)
- Marcel Adam Just (4)
- Luca de Alfaro (2)
- Qing Hu (2)
-
- Ankur Gupta (1)
- Arcot Desai NARASIMHALU (1)
- Bert Wachsmuth (1)
- David G. Novick (1)
- Gabriel A. Moreno (1)
- George H Baker (1)
- Jose P Zagal (1)
- Leslie Marsh (1)
- Ole J Mengshoel (1)
- Pr. Mamoudou H. DICKO, PhD (1)
- Professor Katina Michael (1)
- R. Manmatha (1)
- Ramesh Sitaraman (1)
- Sonya S. Gaither (1)
- Vijay Dialani (1)
- William B. Andreopoulos (1)
- File Type
Articles 31 - 40 of 40
Full-Text Articles in Physical Sciences and Mathematics
Data Driven Image Models Through Continuous Joint Alignment, Erik G. Learned-Miller
Data Driven Image Models Through Continuous Joint Alignment, Erik G. Learned-Miller
Erik G Learned-Miller
This paper presents a family of techniques that we call congealing for modeling image classes from data. The idea is to start with a set of images and make them appear as similar as possible by removing variability along the known axes of variation. This technique can be used to eliminate "nuisance” variables such as affine deformations from handwritten digits or unwanted bias fields from magnetic resonance images. In addition to separating and modeling the latent images—i.e., the images without the nuisance variables—we can model the nuisance variables themselves, leading to factorized generative image models. When nuisance variable distributions are …
A Hierarchical, Hmmbased Automatic Evaluation Of Ocr Accuracy For A Digital Library Of Books, Shaolei Feng, R. Manmatha
A Hierarchical, Hmmbased Automatic Evaluation Of Ocr Accuracy For A Digital Library Of Books, Shaolei Feng, R. Manmatha
R. Manmatha
A number of projects are creating searchable digital libraries of printed books. These include the Million Book Project, the Google Book project and similar efforts from Yahoo and Microsoft. Content-based on line book retrieval usually requires first converting printed text into machine readable (e.g. ASCII) text using an optical character recognition (OCR) engine and then doing full text search on the results. Many of these books are old and there are a variety of processing steps that are required to create an end to end system. Changing any step (including the scanning process) can affect OCR performance and hence a …
Joint Feature Selection For Object Detection And Recognition, Jerod J. Weinman, Allen Hanson, Erik G. Learned-Miller
Joint Feature Selection For Object Detection And Recognition, Jerod J. Weinman, Allen Hanson, Erik G. Learned-Miller
Erik G Learned-Miller
Object detection and recognition systems, such as face detectors and face recognizers, are often trained separately and operated in a feed-forward fashion. Selecting a small number of features for these tasks is important to prevent over-fitting and reduce computation. However, when a system has such related or sequential tasks, selecting features for these tasks independently may not be optimal. We propose a framework for choosing features to be shared between object detection and recognition tasks. The result is a system that achieves better performance by joint training and is faster because some features for identification have already been computed for …
Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara
Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara
Qing Hu
With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …
Discriminative Training Of Hyper-Feature Models For Object Identification, Vidit Jain, Erik G. Learned-Miller
Discriminative Training Of Hyper-Feature Models For Object Identification, Vidit Jain, Erik G. Learned-Miller
Erik G Learned-Miller
Object identification is the task of identifying specific objects belonging to the same class such as cars. We often need to recognize an object that we have only seen a few times. In fact, we often observe only one example of a particular object before we need to recognize it again. Thus we are interested in building a system which can learn to extract distinctive markers from a single example and which can then be used to identify the object in another image as “same ” or “different”. Previous work by Ferencz et al. introduced the notion of hyper-features, which …
A Mobile Agents-Based Approach To Test The Reliability Of Web Services, Jia Zhang
A Mobile Agents-Based Approach To Test The Reliability Of Web Services, Jia Zhang
Jia Zhang
The paradigm of web services has been transforming the internet from a repository of data into a repository of services, or so-called web services. As more and more web services are published on the internet, how to opt for an appropriate and trustworthy web service poses a big challenge. In this paper we propose a mobile agents-based approach that selects reliable web service components in a cost-effective manner.
Neural Basis Of Dyslexia: A Comparison Between Dyslexic And Non-Dyslexic Children Equated For Reading Ability, Fumiko Hoeft, Arvel Hernandez, Glenn Mcmillon, Heather Taylor-Hill, Jennifer L. Martindale, Ann Meyler, Timothy A. Keller, Wai Ting Siok, Gayle K. Deutsch, Marcel Adam Just, Susan Whitfield-Gabrieli, John D. E. Gabrieli
Neural Basis Of Dyslexia: A Comparison Between Dyslexic And Non-Dyslexic Children Equated For Reading Ability, Fumiko Hoeft, Arvel Hernandez, Glenn Mcmillon, Heather Taylor-Hill, Jennifer L. Martindale, Ann Meyler, Timothy A. Keller, Wai Ting Siok, Gayle K. Deutsch, Marcel Adam Just, Susan Whitfield-Gabrieli, John D. E. Gabrieli
Marcel Adam Just
No abstract provided.
Improving Recognition Of Novel Input With Similarity, Jerod J. Weinman, Erik G. Learned-Miller
Improving Recognition Of Novel Input With Similarity, Jerod J. Weinman, Erik G. Learned-Miller
Erik G Learned-Miller
Many sources of information relevant to computer vision and machine learning tasks are often underused. One example is the similarity between the elements from a novel source, such as a speaker, writer, or printed font. By comparing instances emitted by a source, we help ensure that similar instances are given the same label. Previous approaches have clustered instances prior to recognition. We propose a probabilistic framework that unifies similarity with prior identity and contextual information. By fusing information sources in a single model, we eliminate unrecoverable errors that result from processing the information in separate stages and improve overall accuracy. …
Survey Of Computer Supported Business Collaboration In Support Of Business Processes, Carl K. Chang, Jia Zhang, Kai H. Chang
Survey Of Computer Supported Business Collaboration In Support Of Business Processes, Carl K. Chang, Jia Zhang, Kai H. Chang
Jia Zhang
No abstract provided.
Controlled Generation Of Hard And Easy Bayesian Networks: Impact On Maximal Clique Size In Tree Clustering, Ole J. Mengshoel, David C. Wilkins, Dan Roth
Controlled Generation Of Hard And Easy Bayesian Networks: Impact On Maximal Clique Size In Tree Clustering, Ole J. Mengshoel, David C. Wilkins, Dan Roth
Ole J Mengshoel
This article presents and analyzes algorithms that systematically generate random Bayesian networks of varying difficulty levels, with respect to inference using tree clustering. The results are relevant to research on efficient Bayesian network inference, such as computing a most probable explanation or belief updating, since they allow controlled experimentation to determine the impact of improvements to inference algorithms. The results are also relevant to research on machine learning of Bayesian networks, since they support controlled generation of a large number of data sets at a given difficulty level. Our generation algorithms, called BPART and MPART, support controlled but random construction …