Št. zadetkov: 28
Izvirni znanstveni članek
Oznake:
coincidence degree;Jean Mawhin;predator-prey model;spectral theory;
This paper gives an application of Mawhin’s coincidence degree and matrix spectral theory to a predator-prey model with M-predators and N-preys. The method is different from that used in the previous work. Some new sufficient conditions are obtained for the existence and global asymptotic stability ...
Leto:
2012
Vir:
Univerza v Mariboru (UM)
Video in druga učna gradiva
Oznake:
computer science;network analysis;machine learning
Theoretical analysis of structured learning methods has focused primarily on domains where the data consist of {\em independent} (albeit structured) examples. Although the statistical relational learning (SRL) community has recently developed many classification methods for graph and network domains ...
Leto:
2011
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;data mining;databases
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering remains a developing area. In this paper, we propose a flexible and generalized framework for constrained spectral clusterin ...
Leto:
2010
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;data mining;knowledge extraction
Citation recommendation is an interesting but challenging research problem. Most existing studies assume that all papers adopt the same criterion and follow the same behavioral pattern in deciding relevance and authority of a paper. However, in reality, papers have distinct citation behavioral patte ...
Leto:
2014
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;computer vision
Online Multi-Object Tracking (MOT) has wide applications in time-critical video analysis scenarios, such as robot navigation and autonomous driving. In tracking-by-detection, a major challenge of online MOT is how to robustly associate noisy object detections on a new video frame with previously tr ...
Leto:
2015
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;computer vision
We address a new partial person re-identification (reid) problem, where only a partial observation of a person is available for matching across different non-overlapping camera views. This differs significantly from the conventional person re-id setting where it is assumed that the full body of a pe ...
Leto:
2015
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;data science
In display advertising, users’ online ad experiences are important
for the advertising effectiveness. However, users have not been
well accommodated in real-time bidding (RTB). is further influences their site visits and perception of the displayed banner ads. In this paper, we propose a novel com ...
Leto:
2017
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;machine learning
Learning sparse representations on data adaptive dictionaries is a state-of-the-art method for modeling data. But when the dictionary is large and the data dimension is high, it is a computationally challenging problem. We explore three aspects of the problem. First, we derive new, greatly improved ...
Leto:
2011
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;machine learning
Sparse Subspace Clustering (SSC) and Low-Rank Representation (LRR) are both considered as the state-of-the-art methods for {\em subspace clustering}. The two methods are fundamentally similar in that both are convex optimizations exploiting the intuition of "Self-Expressiveness''. The main differenc ...
Leto:
2014
Vir:
videolectures.net
Video in druga učna gradiva
Oznake:
computer science;machine learning
We consider the problem of Bayesian learning on sensitive datasets and present two simple but somewhat surprising results that connect Bayesian learning to “differential privacy”, a cryptographic approach to protect individual-level privacy while permitting database-level utility. Specifically, we s ...
Leto:
2015
Vir:
videolectures.net