-
1
-
2
Discrimination of subsurface unexploded ordnance /
Table of Contents: “…Computation directly supporting discrimination -- 8. Classification -- Appendix: Vector, tensor, and matrix notation.…”
Get full text
Online Book -
3
-
4
-
5
-
6
Status update : celebrity, publicity, and branding in the social media age /
Subjects: Get full text
Online Book -
7
We could not fail : the first African Americans in the space program /
Subjects: Get full text
Online Book -
8
Gender inequality and the potential for change in technology fields /
Subjects: Get full text
Online Book -
9
-
10
-
11
-
12
-
13
Data-driven fault detection and reasoning for industrial monitoring /
Table of Contents: “…Introduction -- Basic Statistical Fault Detection Problems -- Principal Component Analysis -- Canonical Variate Analysis -- Partial Least Squares Regression -- Fisher Discriminant Analysis -- Canonical Variate Analysis -- Fault Classification based on Local Linear Embedding -- Fault Classification based on Fisher Discriminant Analysis -- Quality-Related Global-Local Partial Least Square Projection Monitoring -- Locality-Preserving Partial Least-Squares Statistical Quality Monitoring -- Locally Linear Embedding Orthogonal Projection to Latent Structure (LLEPLS) -- Bayesian Causal Network for Discrete Systems -- Probability Causal Network for Continuous Systems -- Dual Robustness Projection to Latent Structure Method based on the L_1 Norm.…”
Get full text
Online Book -
14
High-dimensional and low-quality visual information processing : from structured sensing and understanding /
Table of Contents: “…Introduction -- Sparse Structure for Visual Signal Sensing -- Graph Structure for Visual Signal Sensing -- Discriminative Structure for Visual Signal Understanding -- Information Theoretic Structure for Visual Signal Understanding -- Conclusions.…”
Get full text
Online Book -
15
Jim blinn's corner : notation, notation, notation.
Table of Contents: “…Chapter Nineteen. Polynomial Discriminants Part I, Matrix MagicChapter Twenty. Polynomial Discriminants Part II, Tensor Diagrams; Chapter Twenty-One. …”
Get full text
Online Book -
16
Orthogonal image moments for human-centric visual pattern recognition /
Table of Contents: “…; 3.3 Facial Features: A Brief Review; 3.4 Moments as Facial Features; 3.5 Discriminative Selection of Moments; 3.5.1 ICC-Based Selection of Moments; 3.5.2 Fisher Scoring of Moments; 3.5.3 AVR-Based Selection of Moments; 3.5.4 Discriminative Features from Moments…”
Get full text
Online Book -
17
Computational image quality /
Table of Contents: “…Experiments -- 4. Visual metrics: discriminative power through flexibility: 4.1. Introduction; 4.2. …”
Get full text
Online Book -
18
Computer vision -- ACCV 2014 : 12th Asian Conference on Computer Vision, Singapore, Singapore, November 1-5, 2014, Revised selected papers.
Table of Contents: “….- DMM-Pyramid Based Deep Architectures for Action Recognition with Depth Cameras.- Discriminative Orderlet Mining for Real-Time Recognition of Human-Object Interaction.- Anomaly Detection via Local Coordinate Factorization and Spatio-Temporal Pyramid.- Intrinsic Image Decomposition from Pair-Wise Shading Ordering.- Never Get Lost Again: Vision Based Navigation Using StreetView Images.- Qualitative and Quantitative Spatio-temporal Relations in Daily Living Activity Recognition.- Blur-Resilient Tracking Using Group Sparsity.- Visual Tracking via Supervised Similarity Matching.- Multi-state Discriminative Video Segment Selection for Complex Event Classification.- Action Recognition in the Presence of One Egocentric and Multiple Static Cameras.- Robust Online Visual Tracking with a Single Convolutional Neural Network.- -Stage Large Point Set Registration Using Gaussian Mixture Models.- Enhanced Sequence Matching for Action Recognition from 3D Skeletal Data.- Multi-label Discriminative Weakly-Supervised Human Activity Recognition and Localization.- Action-Gons: Action Recognition with a Discriminative Dictionary of Structured Elements with Varying Granularity.- Fast Inference of Contaminated Data for Real Time Object Tracking.- Data Mining for Action Recognition.- A Rotation-Invariant Regularization Term for Optical Flow Related Problems.- Landmark-Based Inductive Model for Robust Discriminative Tracking.- Extended Co-occurrence HOG with Dense Trajectories for Fine-Grained.- Motion Based Foreground Detection and Poselet Motion Features for Action Recognition.- Global Motion Estimation from Relative Measurements in the Presence of Outliers -- Clustering Ensemble Tracking.- Query Based Adaptive Re-ranking for Person Re-identification.- Improved Color Patch Similarity Measure Based Weighted Median Filter.- Efficient Pose-Based Action Recognition.- Tracking Multiple People Online and in Real Time.- Optimizing Storage Intensive Vision Applications to Device Capacity.- MTS: A Multiple Temporal Scale Tracker Handling Occlusion and Abrupt Motion Variation.- Video Annotation by Incremental Learning from Grouped Heterogeneous Sources.- A Novel Group-Sparsity-Optimization-Based Feature Selection Model for Complex Interaction Recognition -- Boosting-Based Visual Tracking Using Structural Local Sparse Descriptors.- Coupling Multiple Alignments and Re-ranking for Low-Latency Online Multi-target Tracking.- Determining Interacting Objects in Human-Centric Activities via Qualitative Spatio-Temporal Reasoning -- Enhanced Laplacian Group Sparse Learning with Lifespan Outlier Rejection for Visual Tracking.- Cross-view Action Recognition via Dual-Codebook and Hierarchical Transfer Framework -- Stereo Ground Truth with Error Bars.- Separation of Reflection Components by Sparse Non-negative Matrix Factorization.- Spatiotemporal Derivative Pattern: A Dynamic Texture Descriptor for Video Matching -- Weakly Supervised Action Recognition and Localization Using Web Images -- A Game-Theoretic Probabilistic Approach for Detecting Conversational Groups.…”
Get full text
Online Conference Proceeding Book -
19
Elementary signal detection theory /
Table of Contents: “…Forced-choice procedures -- 7. Discrimination and identification -- 8. Finite-state models -- 9. …”
Get full text
Online Book -
20
Advanced multimedia and ubiquitous engineering : future information technology.
Table of Contents: “…From the Contents: The study on the detection of the damaged file using the graph of the information entropy for Security Management -- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications -- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds -- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis.…”
Get full text
Online Conference Proceeding Book