Sciweavers

497 search results - page 14 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
ICPR
2002
IEEE
14 years 8 months ago
Text Scanner with Text Detection Technology on Image Sequences
We propose a text scanner, which detects wide text strings in a sequence of scene images. For scene text detection, we use a multiple-CAMShift algorithm on a text probability imag...
Keechul Jung, Kwang In Kim, JungHyun Han
JAIR
2010
143views more  JAIR 2010»
13 years 5 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz
CHI
2010
ACM
14 years 7 days ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford
IEEEIAS
2009
IEEE
14 years 2 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
13 years 8 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...