Sciweavers

128 search results - page 20 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
CSFW
2008
IEEE
14 years 2 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
CIVR
2005
Springer
160views Image Analysis» more  CIVR 2005»
14 years 1 months ago
Story Segmentation in News Videos Using Visual and Text Cues
Abstract. In this paper, we present a framework for segmenting the news programs into different story topics. The proposed method utilizes both visual and text information of the v...
Yun Zhai, Alper Yilmaz, Mubarak Shah
ACSAC
2007
IEEE
14 years 2 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
ISBI
2011
IEEE
12 years 11 months ago
Automatic segmentation of the left-ventricular cavity and atrium in 3D ultrasound using graph cuts and the radial symmetry trans
In this paper, we propose a graph-based method for fullyautomatic segmentation of the left ventricle and atrium in 3D ultrasound (3DUS) volumes. Our method requires no user input ...
Radford Juang, Elliot R. McVeigh, Beatrice Hoffman...