Sciweavers

497 search results - page 60 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
APWEB
2005
Springer
15 years 9 months ago
An LOD Model for Graph Visualization and Its Application in Web Navigation
This paper presents a new method for visualizing and navigating huge graphs. The main feature of this method is that it applies Level-Of-Detail (LOD) strategy to graph visualizati...
Shixia Liu, Yue Pan, Liping Yang, Wenyin Liu
IVIC
2009
Springer
15 years 10 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...
SIGIR
2009
ACM
15 years 10 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
WISE
2002
Springer
15 years 9 months ago
A Unified Framework for Web Link Analysis
Web link analysis has been proved to provide significant enhancement to the precision of web search in practice. Among existing approaches, Kleinberg’s HITS and Google’s PageR...
Zheng Chen, Li Tao, Jidong Wang, Liu Wenyin, Wei-Y...
ASSETS
2007
ACM
15 years 8 months ago
Corpus studies in word prediction
Word prediction can be used to enhance the communication rate of people with disabilities who use Augmentative and Alternative Communication (AAC) devices. We use statistical meth...
Keith Trnka, Kathleen F. McCoy