Sciweavers

3395 search results - page 74 / 679
» Computational Differential Privacy
Sort
View
HUC
2007
Springer
14 years 4 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
SIAMCO
2000
99views more  SIAMCO 2000»
13 years 9 months ago
Spectral Analysis of Fokker--Planck and Related Operators Arising From Linear Stochastic Differential Equations
We study spectral properties of certain families of linear second-order differential operators arising from linear stochastic differential equations. We construct a basis in the Hi...
Daniel Liberzon, Roger W. Brockett
FOCS
2008
IEEE
14 years 4 months ago
What Can We Learn Privately?
Learning problems form an important category of computational tasks that generalizes many of the computations researchers apply to large real-life data sets. We ask: what concept ...
Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi ...
CVPR
2004
IEEE
15 years 20 hour ago
A New GPCA Algorithm for Clustering Subspaces by Fitting, Differentiating and Dividing Polynomials
We consider the problem of clustering data lying on multiple subspaces of unknown and possibly different dimensions. We show that one can represent the subspaces with a set of pol...
Jacopo Piazzi, René Vidal, Yi Ma
ICASSP
2011
IEEE
13 years 1 months ago
Video object tracking with differential Structural SIMilarity index
The Structural SIMilarity Measure (SSIM) combined with the sequential Monte Carlo approach has been shown [1] to achieve more reliable video object tracking performance, compared ...
Artur Loza, Fanglin Wang, Jie Yang, Lyudmila Mihay...