Sciweavers

15379 search results - page 223 / 3076
» Protecting users from
Sort
View
KDD
2008
ACM
110views Data Mining» more  KDD 2008»
14 years 8 months ago
Mining preferences from superior and inferior examples
Mining user preferences plays a critical role in many important applications such as customer relationship management (CRM), product and service recommendation, and marketing camp...
Bin Jiang, Jian Pei, Xuemin Lin, David W. Cheung, ...
JMM2
2008
67views more  JMM2 2008»
13 years 8 months ago
Interactive Face Generation from Verbal Description Using Conceptual Fuzzy Sets
In this article, a human centered approach for interactive face generation is presented. The users of the system are given the possibility to interactively generate faces from verb...
Hafida Benhidour, Takehisa Onisawa
PAMI
2007
106views more  PAMI 2007»
13 years 7 months ago
From Template to Image: Reconstructing Fingerprints from Minutiae Points
—Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not r...
Arun Ross, Jidnya Shah, Anil K. Jain
CHI
1995
ACM
13 years 11 months ago
Pre-Screen Projection: From Concept to Testing of a New Interaction Technique
Pre-screen projection is a new interaction technique that allows a user to pan and zoom integrally through a scene simply by moving his or her head relative to the screen. The und...
Deborah Hix, James N. Templeman, Robert J. K. Jaco...
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 8 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork