Sciweavers

474 search results - page 31 / 95
» Prioritized Conditional Imperatives: Problems and a New Prop...
Sort
View
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 6 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
CAIP
2005
Springer
260views Image Analysis» more  CAIP 2005»
14 years 2 months ago
An Illumination Invariant Face Recognition Approach Using Exemplar-Based Synthesis Technique
Abstract. This paper proposes a new method to solve the problem of face recognition under varying illumination conditions. We introduce an exemplar-based technique to decouple and ...
Tele Tan, Thorsten Kühnapfel, Amelyn Wongso, ...
TIME
2006
IEEE
14 years 2 months ago
k-Anonymity in Databases with Timestamped Data
In this paper we extend the notion of k-anonymity in the context of databases with timestamped information in order to naturally define k-anonymous views of temporal data. We als...
Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wa...
CVPR
2010
IEEE
14 years 2 months ago
Polynomial Shape from Shading
We examine the shape from shading problem without boundary conditions as a polynomial system. This view allows, in generic cases, a complete solution for ideal polyhedral objects....
Ady Ecker, Allan Jepson
ICASSP
2009
IEEE
14 years 20 days ago
Learning to maximize signal-to-noise ratio for reverberant speech segregation
Monaural speech segregation in reverberant environments is a very difficult problem. We develop a supervised learning approach by proposing an objective function that directly rel...
Zhaozhang Jin, DeLiang Wang