Sciweavers

2355 search results - page 382 / 471
» Anonymizing Temporal Data
Sort
View
CODASPY
2012
12 years 5 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
WSDM
2012
ACM
214views Data Mining» more  WSDM 2012»
12 years 5 months ago
Selecting actions for resource-bounded information extraction using reinforcement learning
Given a database with missing or uncertain content, our goal is to correct and fill the database by extracting specific information from a large corpus such as the Web, and to d...
Pallika H. Kanani, Andrew K. McCallum
CVPR
2012
IEEE
12 years 15 days ago
Two-person interaction detection using body-pose features and multiple instance learning
Human activity recognition has potential to impact a wide range of applications from surveillance to human computer interfaces to content based video retrieval. Recently, the rapi...
Kiwon Yun, Jean Honorio, Debaleena Chattopadhyay, ...
MMS
2012
12 years 14 days ago
Privacy-sensitive recognition of group conversational context with sociometers
Recognizing the conversational context in which group interactions unfold has applications in machines that support collaborative work and perform automatic social inference using ...
Dinesh Babu Jayagopi, Taemie Kim, Alex Pentland, D...
AAAI
2012
12 years 14 days ago
Pre-Symptomatic Prediction of Plant Drought Stress Using Dirichlet-Aggregation Regression on Hyperspectral Images
Pre-symptomatic drought stress prediction is of great relevance in precision plant protection, ultimately helping to meet the challenge of “How to feed a hungry world?”. Unfor...
Kristian Kersting, Zhao Xu, Mirwaes Wahabzada, Chr...