Sciweavers

2237 search results - page 28 / 448
» Storing information with extractors
Sort
View
DKE
2002
130views more  DKE 2002»
13 years 7 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
CIKM
2009
Springer
14 years 2 months ago
Agglomerating local patterns hierarchically with ALPHA
To increase the relevancy of local patterns discovered from noisy relations, it makes sense to formalize error-tolerance. Our starting point is to address the limitations of state...
Loïc Cerf, Pierre-Nicolas Mougel, Jean-Fran&c...
ICICS
2009
Springer
14 years 2 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
ICPR
2008
IEEE
14 years 2 months ago
Optimal feature weighting for the continuous HMM
We propose new Continuous Hidden Markov Model (CHMM) structure that integrates feature weighting component. We assume that each feature vector could include different subsets of f...
Oualid Missaoui, Hichem Frigui
CCIA
2005
Springer
14 years 1 months ago
Acquiring Unobtrusive Relevance Feedback through Eye-Tracking in Ambient Recommender Systems
Acquiring relevant information to keep user’s preferences up-to-date is crucial in recommender systems in order to close the cycle of recommendations. Ambient Intelligence is a s...
Gustavo González, Beatriz López, Cec...