• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 29,040
Next 10 →

The FERET evaluation methodology for face recognition algorithms

by P. Jonathon Phillips, Hyeonjoon Moon, Syed A. Rizvi, Patrick J. Rauss - In (a) Example 1 (b) Example 1 (c) Right ear) (d) Mirroed Left ear
"... AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial i ..."
Abstract - Cited by 1116 (26 self) - Add to MetaCart
AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial

A database and evaluation methodology for optical flow

by Simon Baker, Daniel Scharstein, J. P. Lewis, Stefan Roth, Michael J. Black, Richard Szeliski - In Proceedings of the IEEE International Conference on Computer Vision , 2007
"... The quantitative evaluation of optical flow algorithms by Barron et al. (1994) led to significant advances in performance. The challenges for optical flow algorithms today go beyond the datasets and evaluation methods proposed in that paper. Instead, they center on problems associated with complex n ..."
Abstract - Cited by 407 (22 self) - Add to MetaCart
The quantitative evaluation of optical flow algorithms by Barron et al. (1994) led to significant advances in performance. The challenges for optical flow algorithms today go beyond the datasets and evaluation methods proposed in that paper. Instead, they center on problems associated with complex

Evaluation methodologies

by unknown authors
"... Intelligent tutoring systems which could be explained by the fact that the xTEx-Sys’s domain knowledge presentation is rather novel titution etwee rning 01), e-l ..."
Abstract - Add to MetaCart
Intelligent tutoring systems which could be explained by the fact that the xTEx-Sys’s domain knowledge presentation is rather novel titution etwee rning 01), e-l

Evaluation Methodology

by Vs Jammer, Flare Airliner, Protection Options, Wing Config. Autopilot
"... • Was stimulated by the need to understand the effectiveness of “off the shelf ” self protection (ECM) systems- in relation to specific threat weapons and engagement geometries • Was stimulated by the high cost of field trials and the availability of airliners • Was stimulated by the need for a syst ..."
Abstract - Add to MetaCart
• Was stimulated by the need to understand the effectiveness of “off the shelf ” self protection (ECM) systems- in relation to specific threat weapons and engagement geometries • Was stimulated by the high cost of field trials and the availability of airliners • Was stimulated by the need for a systematic & repeatable analytical approach resulting in a documented self protection effectiveness audit trail

Evaluation methodology:

by unknown authors
"... properties of MRF image priors ..."
Abstract - Add to MetaCart
properties of MRF image priors

The SPLASH-2 programs: Characterization and methodological considerations

by Steven Cameron Woo, Moriyoshi Ohara, Evan Torrie, Jaswinder Pal Singh, Anoop Gupta - INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE , 1995
"... The SPLASH-2 suite of parallel applications has recently been released to facilitate the study of centralized and distributed shared-address-space multiprocessors. In this context, this paper has two goals. One is to quantitatively characterize the SPLASH-2 programs in terms of fundamental propertie ..."
Abstract - Cited by 1420 (12 self) - Add to MetaCart
scale with problem size and the number of processors. The other, related goal is methodological: to assist people who will use the programs in architectural evaluations to prune the space of application and machine parameters in an informed and meaningful way. For example, by characterizing the working

A comparison and evaluation of multi-view stereo reconstruction algorithms.

by Steven M Seitz , Brian Curless , James Diebel , Daniel Scharstein , Richard Szeliski - In Proc. Computer Vision and Pattern Recognition ’06, , 2006
"... Abstract This paper presents a quantitative comparison of several multi-view stereo reconstruction algorithms. Until now, the lack of suitable calibrated multi-view image datasets with known ground truth (3D shape models) has prevented such direct comparisons. In this paper, we first survey multi-v ..."
Abstract - Cited by 530 (14 self) - Add to MetaCart
-view stereo algorithms and compare them qualitatively using a taxonomy that differentiates their key properties. We then describe our process for acquiring and calibrating multiview image datasets with high-accuracy ground truth and introduce our evaluation methodology. Finally, we present the results of our

Automatic Retrieval and Clustering of Similar Words

by Dekang Lin , 1998
"... greatest challenges in natural language learning. We first define a word similarity measure based on the distributional pattern of words. The similarity measure allows us to construct a thesaurus using a parsed corpus. We then present a new evaluation methodology for the automatically constructed th ..."
Abstract - Cited by 943 (15 self) - Add to MetaCart
greatest challenges in natural language learning. We first define a word similarity measure based on the distributional pattern of words. The similarity measure allows us to construct a thesaurus using a parsed corpus. We then present a new evaluation methodology for the automatically constructed

Evaluating the use of exploratory factor analysis in psychological research

by Leandre R. Fabrigar, Duane T. Wegener, Robert C. MacCallum, Erin J. Strahan - PSYCHOLOGICAL METHODS , 1999
"... Despite the widespread use of exploratory factor analysis in psychological research, researchers often make questionable decisions when conducting these analyses. This article reviews the major design and analytical decisions that must be made when conducting a factor analysis and notes that each of ..."
Abstract - Cited by 524 (4 self) - Add to MetaCart
of these decisions has important consequences for the obtained results. Recommendations that have been made in the methodological literature are discussed. Analyses of 3 existing empirical data sets are used to illustrate how questionable decisions in conducting factor analyses can yield problematic results

A Set Of Principles For Conducting And Evaluating Interpretive Field Studies In Information Systems

by Heinz K. Klein, Michael D. Myers , 1999
"... This article discusses the conduct and evaluation of interpretive research in information systems. While the conventions for evaluating information systems case studies conducted according to the natural science model of social science are now widely accepted, this is not the case for interpretive f ..."
Abstract - Cited by 914 (6 self) - Add to MetaCart
This article discusses the conduct and evaluation of interpretive research in information systems. While the conventions for evaluating information systems case studies conducted according to the natural science model of social science are now widely accepted, this is not the case for interpretive
Next 10 →
Results 1 - 10 of 29,040
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University