Sciweavers

1207 search results - page 198 / 242
» Towards optimal k-anonymization
Sort
View
DATE
2004
IEEE
118views Hardware» more  DATE 2004»
14 years 12 days ago
Distributed Multimedia System Design: A Holistic Perspective
Multimedia systems play a central part in many human activities. Due to the significant advances in the VLSI technology, there is an increasing demand for portable multimedia appl...
Radu Marculescu, Massoud Pedram, Jörg Henkel
CC
2006
Springer
14 years 12 days ago
Interprocedural Dataflow Analysis in the Presence of Large Libraries
Interprocedural dataflow analysis has a large number of uses for software optimization, maintenance, testing, and verification. For software built with reusable components, the tra...
Atanas Rountev, Scott Kagan, Thomas J. Marlowe
CIKM
2006
Springer
14 years 12 days ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
14 years 12 days ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
FGR
2004
IEEE
105views Biometrics» more  FGR 2004»
14 years 12 days ago
Robust Hand Detection
Vision-based hand gesture interfaces require fast and extremely robust hand detection. Here, we study view-specific hand posture detection with an object recognition method recent...
Mathias Kölsch, Matthew Turk