Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
We consider linear systems arising from the use of the finite element method for solving a certain class of linear elliptic problems. Our main result is that these linear systems, ...
Erik G. Boman, Bruce Hendrickson, Stephen A. Vavas...
The statistical footprint left by JPEG compression can be a valuable source of information for the forensic analyst. Recently, it has been shown that a suitable anti-forensic meth...
Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tu...
We present an algorithm for the segmentation of multicell fluorescence microscopy images. Such images abound and a segmentation algorithm robust to different experimental conditio...
Abstract—In classical image classification approaches, lowlevel features have been used. But the high dimensionality of feature spaces poses a challenge in terms of feature selec...
Rajeev Agrawal, Changhua Wu, William I. Grosky, Fa...