Sciweavers

1358 search results - page 74 / 272
» Proceedings
Sort
View
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
13 years 7 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
ICIP
2009
IEEE
13 years 7 months ago
Robust extraction of urinary stones from CT data using attribute filters
In medical imaging, anatomical and other structures such as urinary stones, are often extracted with the aid of active contour/surface models. Active surface-based methods have ro...
Georgios K. Ouzounis, Stilianos Giannakopoulos, Co...
AIL
2010
60views more  AIL 2010»
13 years 7 months ago
Network-based filtering for large email collections in E-Discovery
The information overload in E-Discovery proceedings makes reviewing expensive and it increases the risk of failure to produce results on time and consistently. New interactive tec...
Hans Henseler
AISS
2010
142views more  AISS 2010»
13 years 7 months ago
Service-Oriented Business-IT Alignment: A SOA Governance Model
The concept of Service Oriented Architecture (SOA) has had a significant impact not only on software engineering but on the analysis of an organization's business layer as we...
Mohammad Kazem Haki, Maia Wentland Forte
AUSAI
2010
Springer
13 years 7 months ago
Evolutionary Non Photo-Realistic Animations with Triangular Brushstrokes
Abstract. We have developed a method for generating non photorealistic animations of a target image. The animations start as a random collection of triangular strokes on a canvas a...
Ashkan Izadi, Victor Ciesielski, Marsha Berry