Author of the publication

Nearest neighbor classifier generalization through spatially constrained filters.

, and . Pattern Recognit., 46 (1): 325-331 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Instance-based Transfer Learning Method., , , , , , and . CoRR, (2018)Nearest neighbor classifier generalization through spatially constrained filters., and . Pattern Recognit., 46 (1): 325-331 (2013)Algorithmic Bias in Clinical Populations - Evaluating and Improving Facial Analysis Technology in Older Adults With Dementia., , , , , , , and . IEEE Access, (2019)Reinterpreting the Application of Gabor Filters as a Manipulation of the Margin in Linear Support Vector Machines., , and . IEEE Trans. Pattern Anal. Mach. Intell., 32 (7): 1335-1341 (2010)Video analysis of "YouTube funnies" to aid the study of human gait and falls - preliminary results and proof of concept., , , and . EMBC, page 1178-1181. IEEE, (2017)A Multichannel Markov Random Field Framework for Tumor Segmentation With an Application to Classification of Gene Expression-Based Breast Cancer Recurrence Risk., , , , , and . IEEE Trans. Medical Imaging, 32 (4): 637-648 (2013)Limitations and Biases in Facial Landmark Detection D An Empirical Study on Older Adults with Dementia., , , , , , , and . CVPR Workshops, page 28-36. Computer Vision Foundation / IEEE, (2019)Anomaly Detection Approach to Identify Early Cases in a Pandemic using Chest X-rays., , and . Canadian AI, Canadian Artificial Intelligence Association, (2021)3D augmented Markov random field for object recognition., , , , and . ICIP, page 3889-3892. IEEE, (2010)Heterogeneity Wavelet Kinetics from DCE-MRI for Classifying Gene Expression Based Breast Cancer Recurrence Risk., , , , , , and . MICCAI (2), volume 8150 of Lecture Notes in Computer Science, page 295-302. Springer, (2013)