Sciweavers

16 search results - page 3 / 4
» Stealth Vision for Protecting Privacy
Sort
View
CVPR
2008
IEEE
14 years 9 months ago
Semi-supervised learning of multi-factor models for face de-identification
With the emergence of new applications centered around the sharing of image data, questions concerning the protection of the privacy of people visible in the scene arise. Recently...
Ralph Gross, Latanya Sweeney, Fernando De la Torre...
ICPR
2010
IEEE
13 years 5 months ago
Discriminating Intended Human Objects in Consumer Videos
In a consumer video, there are not only intended objects, which are intentionally captured by the camcorder user, but also unintended objects, which are accidentally framed-in. Sin...
Hiroshi Uegaki, Yuta Nakashima, Noboru Babaguchi
ACSAC
2000
IEEE
14 years 1 days ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
CSMR
2003
IEEE
14 years 27 days ago
Software Services and Software Maintenance
Software services are being promoted as the next big step forward in software engineering.. Inevitably, both service vendor and service client programs will require maintenance. W...
Keith H. Bennett, Jie Xu
CVPR
2012
IEEE
11 years 10 months ago
Classifying covert photographs
The advances in image acquisition techniques make recording images never easier and brings a great convenience to our daily life. It raises at the same time the issue of privacy p...
Haitao Lang, Haibin Ling