Sciweavers

738 search results - page 102 / 148
» Privacy Protection for Speech Information
Sort
View
STOC
2007
ACM
112views Algorithms» more  STOC 2007»
14 years 9 months ago
Smooth sensitivity and sampling in private data analysis
We introduce a new, generic framework for private data analysis. The goal of private data analysis is to release aggregate information about a data set while protecting the privac...
Kobbi Nissim, Sofya Raskhodnikova, Adam Smith
ISI
2005
Springer
14 years 2 months ago
Selective Fusion for Speaker Verification in Surveillance
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
Yosef A. Solewicz, Moshe Koppel
ADC
2009
Springer
141views Database» more  ADC 2009»
14 years 3 months ago
Event-based Communication for Location-based Service Collaboration
Location-based context-aware services for mobile users need to collaborate in disparate networks. Services come and go as the user moves and no central repository is available. Th...
Annika Hinze, Yann Michel, Lisa Eschner
INFOCOM
2008
IEEE
14 years 3 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
SIGCSE
2005
ACM
108views Education» more  SIGCSE 2005»
14 years 2 months ago
Teaching and learning ethics in computer science: walking the walk
The author shares techniques used in a successful "Ethics and Professionalism" class at California State University, San Bernardino. The author describes active learning...
Richard J. Botting