Sciweavers

349 search results - page 39 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
EDBT
2008
ACM
172views Database» more  EDBT 2008»
14 years 8 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
MINENET
2006
ACM
14 years 2 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
CVPR
2007
IEEE
14 years 10 months ago
Image Hallucination Using Neighbor Embedding over Visual Primitive Manifolds
In this paper, we propose a novel learning-based method for image hallucination, with image super-resolution being a specific application that we focus on here. Given a low-resolu...
Wei Fan, Dit-Yan Yeung
CHI
2010
ACM
14 years 3 months ago
Examining multiple potential models in end-user interactive concept learning
End-user interactive concept learning is a technique for interacting with large unstructured datasets, requiring insights from both human-computer interaction and machine learning...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...
CVPR
2000
IEEE
14 years 1 months ago
Error Analysis of Background Adaption
Background modeling is a common component in video surveillance systems and is used to quickly identify regions of interest. To increase the robustness of background subtraction t...
Xiang Gao, Terrance E. Boult, Frans Coetzee, Visva...