نتایج جستجو برای: employing jaccard

تعداد نتایج: 69332  

2012
Cosmin Atanasoaei Chris McCool Sébastien Marcel Christopher McCool

This paper presents a new face detection method. We train a model that predicts the Jaccard distance between a sample sub-window and the ground truth face location. This model produces continuous outputs as opposite to the binary output produced by the widely used boosted cascade classifiers. To train this model we introduce a generalization of the binary classification boosting algorithms in w...

Journal: :Social Networks 2009
Noah E. Friedkin

Network analysts are increasingly being called upon to apply their expertise to groups for which the only available or reliable data is a contact network.With no opportunity to gather additional data, themerits of suchapplicationsdependonempirical studies that validate theemploymentof structural constructs based on contact networks. Fortunately, we possess such studies in abundance. One of the ...

2013
Meng Han Mingyuan Yan Jinbao Li Shouling Ji Yingshu Li

Imprecision, incompleteness and dynamic exist in wide range of network applications. It is difficult to decide the uncertainty relationship among nodes since traditional models do not make sense on uncertain networks, and the inherent computational complexity of problems with uncertainty is always intractable. In this paper, we study how to capture the uncertainty in networks by modeling a seri...

2002
Gilbert Saporta Genane Youness

We propose a methodology for finding the empirical distribution of the Rand’s measure of association when the two partitions only differ by chance. For that purpose we simulate data coming from a latent profile model and we partition them according to 2 groups of variables. We also study two other indices: the first is based on an adaptation of Mac Nemar’s test, the second being Jaccard’s index...

Journal: :IEICE Transactions on Information and Systems 2022

Software developers may write a number of similar source code fragments including the same mistake in software products. To remove such faulty fragments, inspect clones if they found bug their code. While various clone detection methods have been proposed to identify either blocks or functions, those tools do not always fit inspection task because fragment be much smaller than blocks, e.g. sing...

Journal: :JuTISI (Jurnal Teknik Informatika dan Sistem Informasi) 2023

Mesin pencarian artikel telah memudahkan akademisi melakukan studi literatur. Namun, mudah bukan berarti akurat. Untuk topik niche tertentu, hasil sering kali belum sesuai. Snowballing dapat dilakukan untuk mengatasi ini, tapi terbatas pada awal yang dimiliki, khususnya akses penulis ketika dibuat. Sebagai alternatif, database menyediakan rekomendasi relevan dari sebuah artikel, itu saja. Sebua...

2016
Thierry Etchegoyhen Andoni Azpeitia

We describe and evaluate a simple method to extract parallel sentences from comparable corpora. The approach, termed STACC, is based on expanded lexical sets and the Jaccard similarity coefficient. We evaluate our system against state-of-theart methods on a large range of datasets in different domains, for ten language pairs, showing that it either matches or outperforms current methods across ...

2014
Sergio Escalera Xavier Baró Jordi Gonzàlez Miguel Ángel Bautista Meysam Madadi Miguel Reyes Víctor Ponce-López Hugo Jair Escalante Jamie Shotton Isabelle Guyon

This paper summarizes the ChaLearn Looking at People 2014 challenge data and the results obtained by the participants. The competition was split into three independent tracks: human pose recovery from RGB data, action and interaction recognition from RGB data sequences, and multi-modal gesture recognition from RGB-Depth sequences. For all the tracks, the goal was to perform user-independent rec...

Journal: :IJCNIS 2016
Malak Abdullah I. Almarshad Mohssen M. Z. E. Mohammed Al-Sakib Khan Pathan

Zero-day polymorphic worms pose a serious threat to the security of Mobile systems and Internet infrastructure. In many cases, it is difficult to detect worm attacks at an early stage. There is typically little or no time to develop a well-constructed solution during such a worm outbreak. This is because the worms act only to spread from node to node and they bring security concerns to everyone...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید