Sciweavers

3477 search results - page 158 / 696
» From Tables to Frames
Sort
View
TDP
2008
160views more  TDP 2008»
13 years 9 months ago
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-ano...
Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius T...
PVLDB
2010
95views more  PVLDB 2010»
13 years 7 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
DPD
2010
158views more  DPD 2010»
13 years 6 months ago
DYFRAM: dynamic fragmentation and replica management in distributed database systems
In distributed database systems, tables are frequently fragmented and replicated over a number of sites in order to reduce network communication costs. How to fragment, when to rep...
Jon Olav Hauglid, Norvald H. Ryeng, Kjetil N&oslas...
CVPR
2007
IEEE
14 years 11 months ago
On the Direct Estimation of the Fundamental Matrix
The fundamental matrix is a central construct in the analysis of images captured from a pair of cameras and many feature-based methods have been proposed for its computation. In t...
Yaser Sheikh, Asaad Hakeem, Mubarak Shah
ICIP
2006
IEEE
14 years 11 months ago
Video Scene Retrieval Based on Local Region Features
This paper describes a novel method for content extraction and scene retrieval for video sequences based on local region descriptors. The local invariant features are obtained for...
Arasanathan Anjulan, Cedric Nishan Canagarajah