BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
imag (3)
featur (3)
retriev (2)
comput (2)
identif (2)

Stem suspect$ (all stems)

8 papers:

HCISCSM-2015-KastratiIYD #analysis #network #online #social #using
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
Beyond the usual suspects: context-aware revisitation support (RK, GP, EH, WN), pp. 27–36.
RecSysRecSys-2011-TayebiJEGF #named #recommendation
CrimeWalker: a recommendation model for suspect investigation (MAT, MJ, ME, UG, RF), pp. 173–180.
SACSAC-2008-SchiabelSA #detection #image #segmentation
Segmentation technique for detecting suspect masses in dense breast digitized images as a tool for mammography CAD schemes (HS, VTS, MFA), pp. 1333–1337.
DACDAC-2005-MonyBPK #proving
Exploiting suspected redundancy without proving it (HM, JB, VP, RK), pp. 463–466.
SIGMODSIGMOD-2004-LernerSWZZ #algorithm #biology #music #performance #physics
Fast Algorithms for Time Series with applications to Finance, Physics, Music, Biology, and other Suspects (AL, DS, ZW, XZ, YZ), pp. 965–968.
CIKMCIKM-1994-LeeW #identification #image #retrieval
Computer Image Retrieval by Features: Selecting the Best Facial Features for Suspect Identification Systems (ESL, TW), pp. 105–111.
CHIINTERCHI-1993-LeeW #identification #image #retrieval
Computer image retrieval by features: suspect identification (ESL, TW), pp. 494–499.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.