Sciweavers

4085 search results - page 696 / 817
» Data Services - From Data to Containers
Sort
View
114
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
135
Voted
FGR
2008
IEEE
180views Biometrics» more  FGR 2008»
15 years 10 months ago
Image-set matching using a geodesic distance and cohort normalization
An image-set based face recognition algorithm is proposed that exploits the full geometrical interpretation of Canonical Correlation Analysis (CCA). CCA maximizes the correlation ...
Yui Man Lui, J. Ross Beveridge, Bruce A. Draper, M...
144
Voted
IROS
2008
IEEE
148views Robotics» more  IROS 2008»
15 years 10 months ago
Identifying a moving object with an accelerometer in a camera view
— This paper proposes a method for identifying an object which contains an accelerometer out of many moving objects in the view of a stationary camera using motion data obtained ...
Osamu Shigeta, Shingo Kagami, Koichi Hashimoto
143
Voted
ICDM
2007
IEEE
121views Data Mining» more  ICDM 2007»
15 years 10 months ago
Finding Predictive Runs with LAPS
We present an extension to the Lasso [9] for binary classification problems with ordered attributes. Inspired by the Fused Lasso [8] and the Group Lasso [10, 4] models, we aim to...
Suhrid Balakrishnan, David Madigan
144
Voted
UM
2007
Springer
15 years 9 months ago
The Effect of Model Granularity on Student Performance Prediction Using Bayesian Networks
A standing question in the field of Intelligent Tutoring Systems and User Modeling in general is what is the appropriate level of model granularity (how many skills to model) and h...
Zachary A. Pardos, Neil T. Heffernan, Brigham Ande...