— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
This paper reports on the development and application of strategies and tools for geographic information seeking and knowledge building that leverages unstructured text resources ...
Brian M. Tomaszewski, Justine Blanford, Kevin Ross...
In this paper, we study the problem of transfer learning from text to images in the context of network data in which link based bridges are available to transfer the knowledge bet...
—This paper considers the problem of interactively finding the cutting contour to extract components from an existing mesh. First, we propose a constrained random walks algorith...
Persuasive technologies for promoting physical fitness, good nutrition, and other healthy behaviors have been growing in popularity. Despite their appeal, the evaluation of these ...
Julie A. Kientz, Eun Kyoung Choe, Brennen Birch, R...