Sciweavers

1296 search results - page 4 / 260
» Multiplicative Background Risk
Sort
View
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 8 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
ICCV
2009
IEEE
13 years 6 months ago
Realtime background subtraction from dynamic scenes
This paper examines the problem of moving object detection. More precisely, it addresses the difficult scenarios where background scene textures in the video might change over tim...
Li Cheng, Minglun Gong
BMCBI
2008
85views more  BMCBI 2008»
13 years 8 months ago
Merging microarray data from separate breast cancer studies provides a robust prognostic test
Background: There is an urgent need for new prognostic markers of breast cancer metastases to ensure that newly diagnosed patients receive appropriate therapy. Recent studies have...
Lei Xu, Aik Choon Tan, Raimond L. Winslow, Donald ...
NAS
2009
IEEE
14 years 3 months ago
Reliable Lightpath Routing in Optical Mesh Networks under Multiple Link Failures
- In this work, we study the problem of maximizing lightpath reliability in optical mesh networks against simultaneous failures of multiple fiber links without using protection sch...
Shengli Yuan
GLOBECOM
2009
IEEE
14 years 3 months ago
P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks
—Several proposals on P2P-ISP cooperation have recently been developed using information sharing for localitybased peering. Their benefits in terms of P2P efficiency, ISP cost,...
Aliye Özge Kaya, Mung Chiang, Wade Trappe