Sciweavers

53302 search results - page 10576 / 10661
» On the design of a
Sort
View
TDP
2010
166views more  TDP 2010»
13 years 3 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
TIFS
2010
143views more  TIFS 2010»
13 years 3 months ago
Face verification across age progression using discriminative methods
Face verification in the presence of age progression is an important problem that has not been widely addressed. In this paper, we study the problem by designing and evaluating dis...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
TII
2010
146views Education» more  TII 2010»
13 years 3 months ago
PAUC: Power-Aware Utilization Control in Distributed Real-Time Systems
Abstract--CPU utilization control has recently been demonstrated to be an effective way of meeting end-to-end deadlines for distributed real-time systems running in unpredictable e...
Xiaorui Wang, Xing Fu, Xue Liu, Zonghua Gu
TIP
2010
113views more  TIP 2010»
13 years 3 months ago
Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization
Multiplicative noise (also known as speckle noise) models are central to the study of coherent imaging systems, such as synthetic aperture radar and sonar, and ultrasound and laser...
José M. Bioucas-Dias, Mário A. T. Fi...
TIP
2010
107views more  TIP 2010»
13 years 3 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
« Prev « First page 10576 / 10661 Last » Next »