Sciweavers

327 search results - page 26 / 66
» Privacy-Preserving Singular Value Decomposition
Sort
View
SIAMMAX
2011
141views more  SIAMMAX 2011»
14 years 7 months ago
Best Low Multilinear Rank Approximation of Higher-Order Tensors, Based on the Riemannian Trust-Region Scheme
Higher-order tensors are used in many application fields, such as statistics, signal processing, and scientific computing. Efficient and reliable algorithms for manipulating thes...
Mariya Ishteva, Pierre-Antoine Absil, Sabine Van H...
ISCAS
2005
IEEE
142views Hardware» more  ISCAS 2005»
15 years 9 months ago
Multichannel SVD-based image de-noising
: - In this paper, we propose a multichannel SVD-based image de-noising algorithm. The IntDCT is employed to decorrelate the image into sixteen subbands. The SVD is then applied to...
Yodchanan Wongsawat, K. R. Rao, Soontorn Oraintara
ISI
2005
Springer
15 years 9 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
PKDD
2004
Springer
138views Data Mining» more  PKDD 2004»
15 years 9 months ago
Combining Multiple Clustering Systems
Three methods for combining multiple clustering systems are presented and evaluated, focusing on the problem of finding the correspondence between clusters of different systems. ...
Constantinos Boulis, Mari Ostendorf
IJON
2002
90views more  IJON 2002»
15 years 3 months ago
Linearly decodable functions from neural population codes
The population vector is a linear decoder for an ensemble of neurons, whose response properties are nonlinear functions of the input vector. However, previous analyses of this deco...
M. Brandon Westover, Chris Eliasmith, Charles H. A...