Sciweavers

2272 search results - page 173 / 455
» Provable Data Privacy
Sort
View
TDHMS
2010
13 years 9 months ago
Color Based Tracing in Real-Life Surveillance Data
For post incident investigation a complete reconstruction of an event is needed based on surveillance footage of the crime scene and surrounding areas. Reconstruction of the wherea...
Michael J. Metternich, Marcel Worring, Arnold W. M...
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
14 years 6 days ago
Template Protection for PCA-LDA-based 3D Face Recognition Systems
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Daniel Hartung
VLDB
2002
ACM
147views Database» more  VLDB 2002»
13 years 10 months ago
Hippocratic Databases
The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibi...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
ICALP
2009
Springer
14 years 11 months ago
B-Treaps: A Uniquely Represented Alternative to B-Trees
We present the first uniquely represented data structure for an external memory model of computation, a B-tree analogue called a B-treap. Uniquely represented data structures repre...
Daniel Golovin
ICDM
2008
IEEE
122views Data Mining» more  ICDM 2008»
14 years 5 months ago
Nonnegative Matrix Factorization for Combinatorial Optimization: Spectral Clustering, Graph Matching, and Clique Finding
Nonnegative matrix factorization (NMF) is a versatile model for data clustering. In this paper, we propose several NMF inspired algorithms to solve different data mining problems....
Chris H. Q. Ding, Tao Li, Michael I. Jordan