summaryrefslogtreecommitdiff
path: root/datasets/scholar/entries/A data-driven approach to cleaning large face datasets.csv
diff options
context:
space:
mode:
authoradamhrv <adam@ahprojects.com>2018-11-04 21:54:00 +0100
committeradamhrv <adam@ahprojects.com>2018-11-04 21:54:00 +0100
commit9bcba0d02aafb34a5a9ca3db2f894f1fc95401c0 (patch)
tree3dcaf94563498c15b56d51efc62750d0be72e01a /datasets/scholar/entries/A data-driven approach to cleaning large face datasets.csv
parentef45f3c93ffd39b57ee56db74a95f9d2dae074a8 (diff)
parent0dc3e40434c23e4d48119465f39b03bf35fb56bd (diff)
.
Diffstat (limited to 'datasets/scholar/entries/A data-driven approach to cleaning large face datasets.csv')
-rw-r--r--datasets/scholar/entries/A data-driven approach to cleaning large face datasets.csv1
1 files changed, 1 insertions, 0 deletions
diff --git a/datasets/scholar/entries/A data-driven approach to cleaning large face datasets.csv b/datasets/scholar/entries/A data-driven approach to cleaning large face datasets.csv
new file mode 100644
index 00000000..c1bf1f38
--- /dev/null
+++ b/datasets/scholar/entries/A data-driven approach to cleaning large face datasets.csv
@@ -0,0 +1 @@
+A data-driven approach to cleaning large face datasets|http://scholar.google.com/https://ieeexplore.ieee.org/abstract/document/7025068/|2014|163|8|9390951279725836807|None|http://scholar.google.com/scholar?cites=9390951279725836807&as_sdt=2005&sciodt=0,5&hl=en|http://scholar.google.com/scholar?cluster=9390951279725836807&hl=en&as_sdt=0,5|None|Large face datasets are important for advancing face recognition research, but they are tedious to build, because a lot of work has to go into cleaning the huge amount of raw data. To facilitate this task, we describe an approach to building face datasets that starts with detecting faces in images returned from searches for public figures on the Internet, followed by discarding those not belonging to each queried person. We formulate the problem of identifying the faces to be removed as a quadratic programming problem, which exploits the …