Sciweavers

1411 search results - page 243 / 283
» Discriminative Random Fields
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 7 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
CGF
2008
177views more  CGF 2008»
13 years 7 months ago
Expressive Facial Gestures From Motion Capture Data
Human facial gestures often exhibit such natural stochastic variations as how often the eyes blink, how often the eyebrows and the nose twitch, and how the head moves while speaki...
Eunjung Ju, Jehee Lee
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 7 months ago
Security for Wiretap Networks via Rank-Metric Codes
The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver n packets from s...
Danilo Silva, Frank R. Kschischang
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 7 months ago
Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes
We study sensor networks with energy harvesting nodes. The generated energy at a node can be stored in a buffer. A sensor node periodically senses a random field and generates a pa...
Vinod Sharma, Utpal Mukherji, Vinay Joseph
ACTA
2006
104views more  ACTA 2006»
13 years 7 months ago
Safe projections of binary data sets
Abstract Selectivity estimation of a boolean query based on frequent itemsets can be solved by describing the problem by a linear program. However, the number of variables in the e...
Nikolaj Tatti