We introduce a new, generic framework for private data analysis. The goal of private data analysis is to release aggregate information about a data set while protecting the privac...
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
Location-based context-aware services for mobile users need to collaborate in disparate networks. Services come and go as the user moves and no central repository is available. Th...
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
The author shares techniques used in a successful "Ethics and Professionalism" class at California State University, San Bernardino. The author describes active learning...