Author of the publication

What to Reuse?: A Probabilistic Model to Transfer User Annotations in a Surveillance Video.

, , and . CSE, page 42-49. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Data Modeling and Querying for Location-Based Data Warehouses., , and . SSDBM, page 273-282. (2005)Plug-and-Play Queries for Temporal Data Sockets., and . FQAS, volume 10333 of Lecture Notes in Computer Science, page 124-136. Springer, (2017)Adding Valid Time to XPath., and . DNIS, volume 2544 of Lecture Notes in Computer Science, page 29-42. Springer, (2002)Scalable similarity search of timeseries with variable dimensionality., and . CIKM, page 2545-2548. ACM, (2011)Building a display of missing information in a data sieve., and . DOLAP, page 53-60. ACM, (2011)Chronon.. Encyclopedia of Database Systems, Springer US, (2009)The Boomerang White Paper: A Page as You Like It., and . World Wide Web J., (1996)Supporting Valid-Time Indeterminacy., and . ACM Trans. Database Syst., 23 (1): 1-57 (1998)Prefix-Based Node Numbering for Temporal XML., and . WISE, volume 6997 of Lecture Notes in Computer Science, page 172-184. Springer, (2011)Information Retrieval from an Incomplete Data Cube. VLDB, page 532--543. Morgan Kaufmann, (1996)