Sciweavers

1541 search results - page 70 / 309
» Analysis of Random Noise and Random Walk Algorithms
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 9 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
KES
2010
Springer
13 years 7 months ago
Extracting Principal Components from Pseudo-random Data by Using Random Matrix Theory
We develop a methodology to grasp temporal trend in a stock market that changes year to year, or sometimes within a year depending on numerous factors. For this purpose, we employ ...
Mieko Tanaka-Yamawaki
ICASSP
2011
IEEE
13 years 1 months ago
Multi-cue based multi-target tracking using online random forests
Discriminative tracking has become popular tracking methods due to their descriptive power for foreground/background separation. Among these methods, online random forest is recen...
Xinchu Shi, Xiaoqin Zhang, Yang Liu, Weiming Hu, H...
CORR
2006
Springer
147views Education» more  CORR 2006»
13 years 9 months ago
ARQ Diversity in Fading Random Access Channels
A cross-layer optimization approach is adopted for the design of symmetric random access wireless systems. Instead of the traditional collision model, a more realistic physical la...
Young-Han Nam, Praveen Kumar Gopala, Hesham El Gam...
DRM
2007
Springer
14 years 3 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan