Sciweavers

311 search results - page 58 / 63
» Privacy-Preserving Data Imputation
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
ICCV
2003
IEEE
14 years 9 months ago
Weighted and Robust Incremental Method for Subspace Learning
Visual learning is expected to be a continuous and robust process, which treats input images and pixels selectively. In this paper we present a method for subspace learning, which...
Danijel Skocaj, Ales Leonardis
ADHOCNOW
2008
Springer
14 years 1 months ago
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care w...
Dave Singelée, Benoît Latré, B...
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 7 months ago
Modeling relationships at multiple scales to improve accuracy of large recommender systems
The collaborative filtering approach to recommender systems predicts user preferences for products or services by learning past useritem relationships. In this work, we propose no...
Robert M. Bell, Yehuda Koren, Chris Volinsky
IMC
2007
ACM
13 years 9 months ago
Learning network structure from passive measurements
The ability to discover network organization, whether in the form of explicit topology reconstruction or as embeddings that approximate topological distance, is a valuable tool. T...
Brian Eriksson, Paul Barford, Robert Nowak, Mark C...