Exploiting side information in locality preserving projection
Even if the class label information is unknown, side information represents some equivalence constraints between pairs of patterns, indicating whether pairs originate from the same class. Exploiting side information, we develop algorithms to preserve both the intra-class and inter-class local struct...
| Main Authors: | An, Senjian, Liu, Wan-Quan, Venkatesh, Svetha |
|---|---|
| Other Authors: | NA |
| Format: | Conference Paper |
| Published: |
IEEE
2008
|
| Online Access: | http://hdl.handle.net/20.500.11937/30673 |
Similar Items
Ridge Regression for Two Dimensional Locality Preserving Projection
by: Nguyen, Nam, et al.
Published: (2008)
by: Nguyen, Nam, et al.
Published: (2008)
Exploiting monge structures in optimum subwindow search
by: An, Senjian, et al.
Published: (2010)
by: An, Senjian, et al.
Published: (2010)
Effective algorithms for subwindow search in object detection and localization
by: An, Senjian, et al.
Published: (2009)
by: An, Senjian, et al.
Published: (2009)
Face recognition via two dimensional locality preserving projection in frequency domain
by: Lu, C., et al.
Published: (2010)
by: Lu, C., et al.
Published: (2010)
Face recognition based two dimensional locality preserving projection in frequency domain
by: Lu, C., et al.
Published: (2012)
by: Lu, C., et al.
Published: (2012)
Fast cross-validation algorithms for least squares support vector machine and kernel ridge regression
by: An, Senjian, et al.
Published: (2007)
by: An, Senjian, et al.
Published: (2007)
Efficient Cross-validation of the complete Two stages in KFD Classifier Formulation
by: An, Senjian, et al.
Published: (2006)
by: An, Senjian, et al.
Published: (2006)
Double sides 2DPCA for face recognition
by: Lu, C., et al.
Published: (2008)
by: Lu, C., et al.
Published: (2008)
Face feature extraction and recognition via local binary pattern and two-dimensional locality preserving projection
by: Zhou, L., et al.
Published: (2018)
by: Zhou, L., et al.
Published: (2018)
Face Recognition via the Overlapping Energy Histogram
by: Tjahyadi, Ronny, et al.
Published: (2007)
by: Tjahyadi, Ronny, et al.
Published: (2007)
Unified formulation of linear discriminant analysis methods and optimal parameter selection
by: An, Senjian, et al.
Published: (2011)
by: An, Senjian, et al.
Published: (2011)
A smith-waterman local sequence alignment approach to spatial activity recognition
by: Riedel, Daniel, et al.
Published: (2006)
by: Riedel, Daniel, et al.
Published: (2006)
Margin preserving projection for image set based face recognition
by: Fan, K., et al.
Published: (2011)
by: Fan, K., et al.
Published: (2011)
Gender Recognition via Locality Preserving Tensor Analysis on Face Images
by: Qiu, H., et al.
Published: (2010)
by: Qiu, H., et al.
Published: (2010)
Face recognition based on curvelets and local binary pattern features via using local property preservation
by: Zhou, L., et al.
Published: (2014)
by: Zhou, L., et al.
Published: (2014)
Improved Subspace Clustering via Exploitation of Spatial Constraints
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Efficient subwindow search with submodular score functions
by: An, Senjian, et al.
Published: (2011)
by: An, Senjian, et al.
Published: (2011)
Face recognition via local preserving average neighbourhood margin maximization and extreme learning machine
by: Chen, Xiaoming, et al.
Published: (2012)
by: Chen, Xiaoming, et al.
Published: (2012)
Efficient algorithms for subwindow search in object detection and localization
by: An, S., et al.
Published: (2009)
by: An, S., et al.
Published: (2009)
Robust face recognition by utilizing colour information and sparse representation
by: Li, Billy, et al.
Published: (2014)
by: Li, Billy, et al.
Published: (2014)
Exploitation of national or local workers and the liability of the employer
by: Ali Mohamed, Ashgar Ali
Published: (2012)
by: Ali Mohamed, Ashgar Ali
Published: (2012)
Exploitation of national or local workers and the liability of the employer
by: Ali Mohamed, Ashgar Ali
Published: (2013)
by: Ali Mohamed, Ashgar Ali
Published: (2013)
On asymptotically reconstructing local-state trajectories for 2-D systems without exploiting input information
by: Ntogramatzidis, Lorenzo, et al.
Published: (2010)
by: Ntogramatzidis, Lorenzo, et al.
Published: (2010)
Recognising online spatial activities using a bioinformatics inspired sequence alignment approach
by: Riedel, Daniel, et al.
Published: (2008)
by: Riedel, Daniel, et al.
Published: (2008)
Boosting performance for 2D linear discriminant analysis via regression
by: Nguyen, Nam, et al.
Published: (2008)
by: Nguyen, Nam, et al.
Published: (2008)
An innovative face image enhancement based on principle component analysis
by: Xu, Xiang, et al.
Published: (2012)
by: Xu, Xiang, et al.
Published: (2012)
Treshold dynamic time warping for spatial activity recognition
by: Riedel, Daniel, et al.
Published: (2007)
by: Riedel, Daniel, et al.
Published: (2007)
Exploiting layerwise convexity of rectifier networks with sign constrained weights
by: An, Senjian, et al.
Published: (2018)
by: An, Senjian, et al.
Published: (2018)
Exploitation of contract document for construction project planning and controlling
by: Ali, Aminudin
Published: (2006)
by: Ali, Aminudin
Published: (2006)
Robust learning of discriminative projection for multicategory classification on the Stiefel manifold
by: Pham, DucSon, et al.
Published: (2008)
by: Pham, DucSon, et al.
Published: (2008)
Efficient tensor based face recognition
by: Rana, Santu, et al.
Published: (2008)
by: Rana, Santu, et al.
Published: (2008)
Recognising faces in unseen modes: a tensor based approach
by: Rana, Santu, et al.
Published: (2008)
by: Rana, Santu, et al.
Published: (2008)
A unified tensor framework for face recognition
by: Rana, Santu, et al.
Published: (2009)
by: Rana, Santu, et al.
Published: (2009)
USM AIMS FOR THE PRESERVATION AND
CONSERVATION OF LOCAL KNOWLEDGE
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2015)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2015)
How can deep rectifier networks achieve linear separability and preserve distances?
by: An, Senjian, et al.
Published: (2015)
by: An, Senjian, et al.
Published: (2015)
Improving Integrity Constraints Checking In Distributed Databases by Exploiting Local Checking
by: Alwan, Ali Amer
Published: (2008)
by: Alwan, Ali Amer
Published: (2008)
Improved integrity constraints checking in distributed databases by exploiting local checking.
by: Alwan, Ali Amer, et al.
Published: (2009)
by: Alwan, Ali Amer, et al.
Published: (2009)
Privacy and the Access of Information in a Smart House Environment
by: Moncrieff, Simon, et al.
Published: (2007)
by: Moncrieff, Simon, et al.
Published: (2007)
The role of congruence between exploitative and exploratory knowledge sharing in enterprise systems project: polynomial modeling and response surface analysis
by: Liu, Yang, et al.
Published: (2018)
by: Liu, Yang, et al.
Published: (2018)
Similar Items
-
Ridge Regression for Two Dimensional Locality Preserving Projection
by: Nguyen, Nam, et al.
Published: (2008) -
Exploiting monge structures in optimum subwindow search
by: An, Senjian, et al.
Published: (2010) -
Effective algorithms for subwindow search in object detection and localization
by: An, Senjian, et al.
Published: (2009) -
Face recognition via two dimensional locality preserving projection in frequency domain
by: Lu, C., et al.
Published: (2010) -
Face recognition based two dimensional locality preserving projection in frequency domain
by: Lu, C., et al.
Published: (2012)