Sciweavers

186 search results - page 30 / 38
» Generalized deviations in risk analysis
Sort
View
COMAD
2008
13 years 9 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
GRC
2010
IEEE
13 years 8 months ago
Interval Type-2 Fuzzy PI Controllers: Why They are More Robust
Abstract—Many experiments have shown that interval type2 (IT2) fuzzy PI controllers are generally more robust than their type-1 (T1) counterparts, as they are better able to cope...
Dongrui Wu, Woei Wan Tan
TKDE
2010
168views more  TKDE 2010»
13 years 6 months ago
Completely Lazy Learning
—Local classifiers are sometimes called lazy learners because they do not train a classifier until presented with a test sample. However, such methods are generally not complet...
Eric K. Garcia, Sergey Feldman, Maya R. Gupta, San...
ESORICS
2010
Springer
13 years 5 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
ICCV
2009
IEEE
13 years 5 months ago
Realtime background subtraction from dynamic scenes
This paper examines the problem of moving object detection. More precisely, it addresses the difficult scenarios where background scene textures in the video might change over tim...
Li Cheng, Minglun Gong