Sciweavers

1277 search results - page 146 / 256
» An Evaluation Approach for Dynamics-Aware Applications Using...
Sort
View
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
15 years 3 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
AAAI
2008
15 years 5 months ago
A Utility-Theoretic Approach to Privacy and Personalization
Online services such as web search, news portals, and ecommerce applications face the challenge of providing highquality experiences to a large, heterogeneous user base. Recent ef...
Andreas Krause, Eric Horvitz
124
Voted
CVPR
2008
IEEE
16 years 5 months ago
Dimensionality reduction using covariance operator inverse regression
We consider the task of dimensionality reduction for regression (DRR) whose goal is to find a low dimensional representation of input covariates, while preserving the statistical ...
Minyoung Kim, Vladimir Pavlovic
CVPR
2005
IEEE
16 years 5 months ago
Rank-R Approximation of Tensors: Using Image-as-Matrix Representation
We present a novel multilinear algebra based approach for reduced dimensionality representation of image ensembles. We treat an image as a matrix, instead of a vector as in tradit...
Hongcheng Wang, Narendra Ahuja
129
Voted
ICICS
2005
Springer
15 years 9 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...