Sciweavers

458 search results - page 48 / 92
» exact 2009
Sort
View
CVPR
2009
IEEE
1133views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Sparse Subspace Clustering
We propose a method based on sparse representation (SR) to cluster data drawn from multiple low-dimensional linear or affine subspaces embedded in a high-dimensional space. Our ...
Ehsan Elhamifar, René Vidal
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 10 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
ICDE
2009
IEEE
180views Database» more  ICDE 2009»
14 years 10 months ago
Outsourcing Search Services on Private Spatial Data
Social networking and content sharing service providers, e.g., Facebook and Google Maps, enable their users to upload and share a variety of user-generated content, including locat...
Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen...
MICCAI
2009
Springer
14 years 9 months ago
Automatic Extraction of Mandibular Nerve and Bone from Cone-Beam CT Data
The exact localization of the mandibular nerve with respect to the bone is important for applications in dental implantology and maxillofacial surgery. Cone beam computed tomograph...
Dagmar Kainmueller, Hans Lamecker, Heiko Seim, ...
GIS
2009
ACM
14 years 9 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku