Sciweavers

342 search results - page 62 / 69
» Evaluation of Classifiers for an Uneven Class Distribution P...
Sort
View
ICDT
2009
ACM
109views Database» more  ICDT 2009»
14 years 7 months ago
TOP-K projection queries for probabilistic business processes
A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specific...
Daniel Deutch, Tova Milo
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 7 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
ACCV
2009
Springer
14 years 1 months ago
Detecting Spatiotemporal Structure Boundaries: Beyond Motion Discontinuities
Abstract. The detection of motion boundaries has been and remains a longstanding challenge in computer vision. In this paper, the recovery of motion boundaries is recast in a broad...
Konstantinos G. Derpanis, Richard P. Wildes
ICMCS
2006
IEEE
181views Multimedia» more  ICMCS 2006»
14 years 22 days ago
Toward Intelligent Use of Semantic Information on Subspace Discovery for Image Retrieval
Image retrieval has been widely used in many fields of science and engineering. The semantic concept of user interest is obtained by a learning process. Traditional techniques oft...
Jie Yu, Qi Tian
CCS
2004
ACM
14 years 3 days ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii