Browsing Closed by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Anaissi, Ali Hassan; Kennedy, Paul; Goyal, Madhu; Catchpoole, Daniel (Biomed Central Ltd, 2013)
    Background: The wealth of gene expression values being generated by high throughput microarray technologies leads to complex high dimensional datasets. Moreover, many cohorts have the problem of imbalanced classes where ...
  • Li, Jun; Tao, Dacheng (IEEE-Inst Electrical Electronics Engineers Inc, 2013)
    Factorization-based techniques explain arrays of observations using a relatively small number of factors and provide an essential arsenal for multi-dimensional data analysis. Most factorization models are, however, developed ...
  • Tao, Dacheng; Song, Mingli; Li, Xuelong; Shen, Jialie; Sun, Jimeng; Wu, Xindong; Faloutsos, Christos; Maybank, Stephen (IEEE-Inst Electrical Electronics Engineers Inc, 2008)
    Effectively modeling a collection of three-dimensional (3-D) faces is an important task in various applications, especially facial expression-driven ones, e.g., expression generation, retargeting, and synthesis. These 3-D ...
  • Zhao, Liang; Wong, Limsoon; Lu, Lanyuan; Hoi, Steven; Li, Jinyan (BioMed Central Ltd, 2012)
    Background Prediction of B-cell epitopes from antigens is useful to understand the immune basis of antibody-antigen recognition, and is helpful in vaccine design and drug development. Tremendous efforts have been devoted ...
  • Zhao, Liang; Wong, Limsoon; Lu, Lanyuan; Hoi, Steven; Li, Jinyan (BioMed Central Ltd, 2012)
    Background Prediction of B-cell epitopes from antigens is useful to understand the immune basis of antibody-antigen recognition, and is helpful in vaccine design and drug development. Tremendous efforts have been devoted ...
  • Cao Longbing; Yu Philip (IEEE Computer Society, 2009)
    Behavior is increasingly recognized as a key entity in business intelligence and problem-solving. Even though behavior analysis has been extensively investigated in social sciences and behavior sciences, in which qualitative ...
  • Webb, Stephen; Furukawa, Tomonari (VSP, 2008)
    This paper presents the architecture of a feedforward manipulator control strategy based on a belief function that may be appropriate for less controlled environments. In this architecture, the belief about the environmental ...
  • Tselekidis, G; Peppas, Pavlos; Williams, Mary-Anne (Palgrave Publishers Ltd, 2003)
  • Bian, Wei; Tao, Dacheng (IEEE-Inst Electrical Electronics Engineers Inc, 2010)
    With many potential multimedia applications, content-based image retrieval (CBIR) has recently gained more attention for image management and web search. A wide variety of relevance feedback (RF) algorithms have been ...
  • Zhang, Peng; Zhu, Xingquan; Shi, Yong (Elseviererlands, 2009)
    Regularized Multiple Criteria Linear Programming (RMCLP) models have recently shown to be effective for data classification. While the models are becoming increasingly important for data mining community, very little work ...
  • Tsai, Po-Hsiang; Cao, Longbing; Hintz, Thomas; Jan, Tony (Elsevier Science Bv, 2009)
    Among many biometric characteristics, the facial biometric is considered to be the least intrusive technology that can be deployed in the real-world visual surveillance environment. However, in facial biometric, little ...
  • Yuan, Yuan; Li, Xuelong; Pang, Yanwei; Lu, Xin; Tao, Dacheng (IEEE-Inst Electrical Electronics Engineers Inc, 2009)
    This paper presents a fast part-based subspace selection algorithm, termed the binary sparse nonnegative matrix factorization (B-SNMF). Both the training process and the testing process of B-SNMF are much faster than those ...
  • Pang, Yanwei; Tao, Dacheng; Yuan, Yuan; Li, Xuelong (IEEE-Inst Electrical Electronics Engineers Inc, 2008)
    Fast training and testing procedures are crucial in biometrics recognition research. Conventional algorithms, e.g., principal component, analysis (PCA), fail to efficiently work on large-scale and high-resolution image ...
  • Liu, Qian; Kwok, Chee; Li, Jinyan (ACS Publications, 2013)
    Accurate determination of protein?ligand binding affinity is a fundamental problem in biochemistry useful for many applications including drug design and protein?ligand docking. A number of scoring functions have been ...
  • Mu, Yang; Tao, Dacheng (Elsevier Science Bv, 2010)
    Using biometric resources to recognize a person has been a recent concentration on computer vision. Previously, biometric research has forced on utilizing iris, finger print, palm print, and shoe print to authenticate and ...
  • Song, Dongjin; Tao, Dacheng (IEEE-Inst Electrical Electronics Engineers Inc, 2010)
    Biologically inspired feature (BIF) and its variations have been demonstrated to be effective and efficient for scene classification. It is unreasonable to measure the dissimilarity between two BIFs based on their Euclidean ...
  • Huang, Kaiqi; Tao, Dacheng; Yuan, Yuan; Li, Xuelong; Tan, Tieniu (IEEE-Inst Electrical Electronics Engineers Inc, 2011)
    Inspired by human visual cognition mechanism, this paper first presents a scene classification method based on an improved standard model feature. Compared with state-of-the-art efforts in scene classification, the newly ...
  • Chiang, Frank; Braun, Robin; Hughes, John (Troubador, 2006)
    This paper describes the design of a scalable bio-mimetic framework that addresses several key issues of autonomous agents in the functional management domain of complex Ubiquitous Service-Oriented Networks.We propose an ...
  • Mu, Yang; Tao, Dacheng; Li, Xuelong; Murtagh, Fionn (Springer, 2009)
    According to the research results reported in the past decades, it is well acknowledged that face recognition is not a trivial task. With the development of electronic devices, we are gradually revealing the secret of ...
  • Feng, Yuan; Duan, Runyao; Ying, Mingsheng (Assoc Computing Machinery, 2012)
    Quantum cryptographic systems have been commercially available, with a striking advantage over classical systems that their security and ability to detect the presence of eavesdropping are provable based on the principles ...