Sciweavers

198 search results - page 12 / 40
» Evidence-invariant Sensitivity Bounds
Sort
View
TMI
2008
108views more  TMI 2008»
13 years 7 months ago
Estimation and Statistical Bounds for Three-Dimensional Polar Shapes in Diffuse Optical Tomography
Abstract--Voxel-based reconstructions in diffuse optical tomography (DOT) using a quadratic regularization functional tend to produce very smooth images due to the attenuation of h...
Gregory Boverman, Eric L. Miller, Dana H. Brooks, ...
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 8 months ago
Large Margin Multiclass Gaussian Classification with Differential Privacy
As increasing amounts of sensitive personal information is aggregated into data repositories, it has become important to develop mechanisms for processing the data without revealin...
Manas A. Pathak, Bhiksha Raj
NSDI
2010
13 years 9 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
RTCSA
2000
IEEE
14 years 8 days ago
Tracking Real-Time Systems Requirements
One of the hard problems in maintaining real-time systems requirements is to keep track of the impact of resource usage on the applications. Often times, it is not sufficient to ...
Aloysius K. Mok
CCS
2008
ACM
13 years 10 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun