Sciweavers

53 search results - page 9 / 11
» A Framework for Identifying Textual Redundancy
Sort
View
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 7 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
ATAL
2009
Springer
14 years 2 months ago
Sensitivity analysis for distributed optimization with resource constraints
Previous work in multiagent coordination has addressed the challenge of planning in domains where agents must optimize a global goal, while satisfying local resource constraints. ...
Emma Bowring, Zhengyu Yin, Rob Zinkov, Milind Tamb...
CCS
2003
ACM
14 years 23 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
CVPR
2008
IEEE
14 years 9 months ago
Semi-supervised SVM batch mode active learning for image retrieval
Active learning has been shown as a key technique for improving content-based image retrieval (CBIR) performance. Among various methods, support vector machine (SVM) active learni...
Steven C. H. Hoi, Rong Jin, Jianke Zhu, Michael R....
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 8 months ago
Computer aided detection via asymmetric cascade of sparse hyperplane classifiers
This paper describes a novel classification method for computer aided detection (CAD) that identifies structures of interest from medical images. CAD problems are challenging larg...
Jinbo Bi, Senthil Periaswamy, Kazunori Okada, Tosh...