Sciweavers

260 search results - page 18 / 52
» Providing Data Group Anonymity Using Concentration Differenc...
Sort
View
ICTAI
2008
IEEE
14 years 1 months ago
Veritas: Combining Expert Opinions without Labeled Data
We consider a variation of the problem of combining expert opinions for the situation in which there is no ground truth to use for training. Even though we don’t have labeled da...
Sharath R. Cholleti, Sally A. Goldman, Avrim Blum,...
CLEF
2008
Springer
13 years 9 months ago
Overview of the ImageCLEFmed 2008 Medical Image Retrieval Task
2008 was the fifth year for the medical image retrieval task of ImageCLEF, one of the most popular tracks within CLEF. Participation continued to increase in 2008. A total of 15 g...
Henning Müller, Jayashree Kalpathy-Cramer, Ch...
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
14 years 20 days ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
SASN
2003
ACM
14 years 18 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
PDPTA
2010
13 years 5 months ago
Distributed Mobile Computing: Development of Distributed Applications Using Mobile Agents
There exist distributed scenarios in which the need for dynamism, mobility, and adaptivity, has to be addressed with highly dynamical approaches. These scenarios present different ...
Carlos Bobed, Sergio Ilarri, Eduardo Mena