Sciweavers

392 search results - page 27 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
CVPR
2004
IEEE
15 years 20 days ago
A GMM Parts Based Face Representation for Improved Verification through Relevance Adaptation
Motivated by the success of parts based representations in face detection we have attempted to address some of the problems associated with applying such a philosophy to the task ...
Simon Lucey, Tsuhan Chen
ICDCSW
2006
IEEE
14 years 4 months ago
Fault-Tolerance Verification of the Fluids and Combustion Facility of the International Space Station
The Fluids and Combustion Facility (FCF) will be a permanent modular, multi-user facility used to accommodate microgravity science experiments in the U.S. Laboratory Module onboar...
Raquel S. Whittlesey-Harris, Mikhail Nesterenko
SDM
2004
SIAM
242views Data Mining» more  SDM 2004»
14 years 17 hour ago
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analy...
Wenliang Du, Yunghsiang S. Han, Shigang Chen
SIGIR
2002
ACM
13 years 10 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
DIM
2006
ACM
14 years 4 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...