Sciweavers

494 search results - page 77 / 99
» Ballot mark detection
Sort
View
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
14 years 3 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
ICMCS
2006
IEEE
223views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Removing Shadows using Flash/Noflash Image Edges
Flash/noflash pairs have been used for noise-reduction in ambient-light images. But not explicitly studied is the problem of shadows in the ambient images. While shadows are less...
Mark S. Drew, Cheng Lu, Graham D. Finlayson
ISCC
2006
IEEE
202views Communications» more  ISCC 2006»
14 years 3 months ago
Fuzzy Logic Congestion Control in TCP/IP Tandem Networks
Network resource management and control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. While many Activ...
Chrysostomos Chrysostomou, Andreas Pitsillides
HT
2006
ACM
14 years 3 months ago
A social hypertext model for finding community in blogs
Blogging has become the newest communication medium for creating a virtual community, a set of blogs linking back and forth to one another’s postings, while discussing common to...
Alvin Chin, Mark H. Chignell
DSN
2005
IEEE
14 years 3 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...