Sciweavers

288 search results - page 25 / 58
» Estimating the maximum information leakage
Sort
View
CVPR
2000
IEEE
13 years 11 months ago
Statistical Shape Influence in Geodesic Active Contours
A novel method of incorporating shape information into the image segmentation process is presented. We introduce a representation for deformable shapes and define a probability di...
Michael E. Leventon, W. Eric L. Grimson, Olivier D...
BMCBI
2006
119views more  BMCBI 2006»
13 years 7 months ago
LS-NMF: A modified non-negative matrix factorization algorithm utilizing uncertainty estimates
Background: Non-negative matrix factorisation (NMF), a machine learning algorithm, has been applied to the analysis of microarray data. A key feature of NMF is the ability to iden...
Guoli Wang, Andrew V. Kossenkov, Michael F. Ochs
PLDI
2010
ACM
14 years 5 months ago
The Reachability-Bound Problem
We define the reachability-bound problem to be the problem of finding a symbolic worst-case bound on the number of times a given control location inside a procedure is visited in ...
Sumit Gulwani, Florian Zuleger
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
14 years 1 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 27 days ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik