Sciweavers

808 search results - page 62 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
14 years 8 months ago
Cross domain distribution adaptation via kernel mapping
When labeled examples are limited and difficult to obtain, transfer learning employs knowledge from a source domain to improve learning accuracy in the target domain. However, the...
ErHeng Zhong, Wei Fan, Jing Peng, Kun Zhang, Jiang...
KDD
2010
ACM
275views Data Mining» more  KDD 2010»
13 years 11 months ago
Combined regression and ranking
Many real-world data mining tasks require the achievement of two distinct goals when applied to unseen data: first, to induce an accurate preference ranking, and second to give g...
D. Sculley
BIOID
2008
157views Biometrics» more  BIOID 2008»
13 years 9 months ago
Modeling Marginal Distributions of Gabor Coefficients: Application to Biometric Template Reduction
Abstract. Gabor filters have demonstrated their effectiveness in automatic face recognition. However, one drawback of Gabor-based face representations is the huge amount of data th...
Daniel González-Jiménez, José...
ESORICS
2004
Springer
14 years 1 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
CIKM
2005
Springer
14 years 1 months ago
Towards automatic association of relevant unstructured content with structured query results
Faced with growing knowledge management needs, enterprises are increasingly realizing the importance of seamlessly integrating critical business information distributed across bot...
Prasan Roy, Mukesh K. Mohania, Bhuvan Bamba, Shree...