Sciweavers

498 search results - page 76 / 100
» Being Sensitive to Uncertainty
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
TVCG
2012
181views Hardware» more  TVCG 2012»
11 years 10 months ago
Interactive Image Segmentation Based on Level Sets of Probabilities
—In this paper, we present a robust and accurate algorithm for interactive image segmentation. The level set method is clearly advantageous for image objects with a complex topol...
Yugang Liu, Yizhou Yu
TKDE
2012
215views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...
SIGSOFT
2005
ACM
14 years 8 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
CVPR
2010
IEEE
14 years 4 months ago
Geodesic Graph Cut for Interactive Image Segmentation
Interactive segmentation is useful for selecting objects of interest in images and continues to be a topic of much study. Methods that grow regions from foreground/background seed...
Brian Price, Bryan Morse, Scott Cohen