Author of the publication

National Institute of Informatics, Japan at TRECVID 2012.

, , , , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cartography of Spatial Relationships in a Symbolic Image Database., , and . CAIP (1), volume 6854 of Lecture Notes in Computer Science, page 377-385. Springer, (2011)Re-ranking for person re-identification., , , , , and . SoCPaR, page 304-308. IEEE, (2013)Efficient Pruning Schemes for Distance-Based Outlier Detection., and . ECML/PKDD (2), volume 5782 of Lecture Notes in Computer Science, page 160-175. Springer, (2009)qEstimation: a process for estimating size and effort of software testing., , and . ICSSP, page 20-28. ACM, (2013)Non-parametric Methods for Correlation Analysis in Multivariate Data with Applications in Data Mining.. Karlsruhe Institute of Technology, (2015)National Institute of Informatics, Japan at TRECVID 2012., , , , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2012)Manifold Harmonic Transform and Spatial Relationships for Partial 3D Object Retrieval., and . 3DOR, page 37-44. Eurographics Association, (2014)Person re-identification with mutual re-ranking., , , and . Vietnam. J. Comput. Sci., 4 (4): 233-244 (2017)Mining Outliers with Ensemble of Heterogeneous Detectors on Random Subspaces., , and . DASFAA (1), volume 5981 of Lecture Notes in Computer Science, page 368-383. Springer, (2010)Multi-UAV Coverage Strategy with V-shaped Formation for Patrol and Surveillance., , , and . ICCAIS, page 487-492. IEEE, (2022)