Sciweavers

18374 search results - page 3673 / 3675
» Applications for data hiding
Sort
View
TVCG
2012
178views Hardware» more  TVCG 2012»
11 years 10 months ago
Human Motion Retrieval from Hand-Drawn Sketch
—The rapid growth of motion capture data increases the importance of motion retrieval. The majority of the existing motion retrieval approaches are based on a labor-intensive ste...
Min-Wen Chao, Chao-Hung Lin, Jackie Assa, Tong-Yee...
ICDCS
2012
IEEE
11 years 10 months ago
NEAT: Road Network Aware Trajectory Clustering
—Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean di...
Binh Han, Ling Liu, Edward Omiecinski
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 10 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
EDBT
2012
ACM
299views Database» more  EDBT 2012»
11 years 10 months ago
RecStore: an extensible and adaptive framework for online recommender queries inside the database engine
Most recommendation methods (e.g., collaborative filtering) consist of (1) a computationally intense offline phase that computes a recommender model based on users’ opinions o...
Justin J. Levandoski, Mohamed Sarwat, Mohamed F. M...
MLMI
2004
Springer
14 years 28 days ago
Towards Predicting Optimal Fusion Candidates: A Case Study on Biometric Authentication Tasks
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extend in various real-life applications. ...
Norman Poh, Samy Bengio
« Prev « First page 3673 / 3675 Last » Next »