Sciweavers

603 search results - page 45 / 121
» Advances in constrained clustering
Sort
View
SASO
2007
IEEE
14 years 4 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
SAC
2010
ACM
14 years 3 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
ECCV
2008
Springer
14 years 11 months ago
Extracting Moving People from Internet Videos
Abstract. We propose a fully automatic framework to detect and extract arbitrary human motion volumes from real-world videos collected from YouTube. Our system is composed of two s...
Juan Carlos Niebles, Bohyung Han, Andras Ferencz, ...
PKDD
2007
Springer
114views Data Mining» more  PKDD 2007»
14 years 4 months ago
Robust Visual Mining of Data with Error Information
Abstract. Recent results on robust density-based clustering have indicated that the uncertainty associated with the actual measurements can be exploited to locate objects that are ...
Jianyong Sun, Ata Kabán, Somak Raychaudhury
SIGIR
2005
ACM
14 years 3 months ago
Noun sense induction using web search results
This paper presents an algorithm for unsupervised noun sense induction, based on clustering of Web search results. The algorithm does not utilize labeled training instances or any...
Goldee Udani, Shachi Dave, Anthony Davis, Tim Sibl...