Sciweavers

909 search results - page 135 / 182
» Games for extracting randomness
Sort
View
DMIN
2006
138views Data Mining» more  DMIN 2006»
14 years 7 days ago
Quantification of a Privacy Preserving Data Mining Transformation
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Mohammed Ketel
ESANN
2003
14 years 6 days ago
Semi-automatic acquisition and labelling of image data using SOMs
Abstract. Application of neural networks for real world object recognition suffers from the need to acquire large quantities of labelled image data. We propose a solution that acq...
Gunther Heidemann, Axel Saalbach, Helge Ritter
ICML
2010
IEEE
13 years 12 months ago
Sequential Projection Learning for Hashing with Compact Codes
Hashing based Approximate Nearest Neighbor (ANN) search has attracted much attention due to its fast query time and drastically reduced storage. However, most of the hashing metho...
Jun Wang, Sanjiv Kumar, Shih-Fu Chang
INFORMATICALT
2006
364views more  INFORMATICALT 2006»
13 years 10 months ago
A Copyright Protection using Watermarking Algorithm
In this paper, a digital watermarking algorithm for copyright protection based on the concept of embed digital watermark and modifying frequency coefficients in discrete wavelet tr...
Aboul Ella Hassanien
SCN
2008
Springer
116views Communications» more  SCN 2008»
13 years 10 months ago
General Certificateless Encryption and Timed-Release Encryption
While recent timed-release encryption (TRE) schemes are implicitly supported by a certificateless encryption (CLE) mechanism, the security models of CLE and TRE differ and there is...
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffe...