2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016
DOI: 10.1109/cvpr.2016.577
|View full text |Cite
|
Sign up to set email alerts
|

Simultaneous Clustering and Model Selection for Tensor Affinities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 35 publications
0
15
0
Order By: Relevance
“…Some transform the hyper-correlation into a simpler pairwise graph [21], [66], followed by a standard graph clustering method, e.g., normalized cut [11], to calculate the assignments. Besides, other methods [39], [13] explore a generalized way of extending the pairwise graph to the hyper-graph or hyperdimensional tensor analysis. For instance, Li et al propose a tensor affinity variant of SCAMS, i.e., SCAMSTA [13], which exploits the higher order mathematical structures by providing multiple groups of nodes in the binary matrix derived from an outer product operation on multiple indicator vectors.…”
Section: Hyper-graph Clusteringmentioning
confidence: 99%
See 4 more Smart Citations
“…Some transform the hyper-correlation into a simpler pairwise graph [21], [66], followed by a standard graph clustering method, e.g., normalized cut [11], to calculate the assignments. Besides, other methods [39], [13] explore a generalized way of extending the pairwise graph to the hyper-graph or hyperdimensional tensor analysis. For instance, Li et al propose a tensor affinity variant of SCAMS, i.e., SCAMSTA [13], which exploits the higher order mathematical structures by providing multiple groups of nodes in the binary matrix derived from an outer product operation on multiple indicator vectors.…”
Section: Hyper-graph Clusteringmentioning
confidence: 99%
“…2) Comparative Methods: We make comparisons with the following methods: SCAMS [13], [29], a density peak based method (DP) [19], a singular value decomposition based method (SVD) [58] and DP-space [12]. Besides, we utilize the following subspace representation methods to generate different coefficient matrices C: LRR [39], CASS [52], LSR [46], SMR [32] and ORGEN [33].…”
Section: A Experimental Setupmentioning
confidence: 99%
See 3 more Smart Citations