Sciweavers

1319 search results - page 243 / 264
» Recursive Random Fields
Sort
View
KDD
2005
ACM
104views Data Mining» more  KDD 2005»
14 years 7 months ago
A hit-miss model for duplicate detection in the WHO drug safety database
The WHO Collaborating Centre for International Drug Monitoring in Uppsala, Sweden, maintains and analyses the world's largest database of reports on suspected adverse drug re...
Andrew Bate, G. Niklas Norén, Roland Orre
MOBISYS
2005
ACM
14 years 7 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
3DGIS
2006
Springer
14 years 1 months ago
Digital Terrain Models Derived from SRTM Data and Kriging
The objective of this work is to define procedures to improve spatial resolution of SRTM data and to evaluate their applicability in the Serra Negra region, in the district of Pat...
T. Bernardes, I. Gontijo, H. Andrade, T. G. C. Vie...
NIPS
2008
13 years 8 months ago
Natural Image Denoising with Convolutional Networks
We present an approach to low-level vision that combines two main ideas: the use of convolutional networks as an image processing architecture and an unsupervised learning procedu...
Viren Jain, H. Sebastian Seung
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 8 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny