Sciweavers

260 search results - page 25 / 52
» Providing Data Group Anonymity Using Concentration Differenc...
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Voice convergin: Speaker de-identification by voice transformation
Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
BMCBI
2007
154views more  BMCBI 2007»
13 years 7 months ago
Classification of heterogeneous microarray data by maximum entropy kernel
Background: There is a large amount of microarray data accumulating in public databases, providing various data waiting to be analyzed jointly. Powerful kernel-based methods are c...
Wataru Fujibuchi, Tsuyoshi Kato
GROUP
2005
ACM
14 years 29 days ago
Negotiation and the coordination of information and activity in distributed software problem management
Publicly accessible bug report repositories maintained by free / open source development communities provide vast stores of data about distributed software problem management (SWP...
Robert J. Sandusky, Les Gasser
ICMLA
2009
13 years 5 months ago
Learning Geographic Regions using Location Based Services in Next Generation Networks
Abstract--In this paper we apply classification to learn geographic regions using Location Based Services (LBS) in Next Generation Networks (NGN). We assume that the information in...
Yuheng He, Attila Bilgic
CCS
2010
ACM
13 years 7 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...