Sciweavers

180
Voted

Source Code
2567views
17 years 1 months ago
Variational Methods on the GPU (Optical Flow Segmentation etc.)
This page contains several methods using variational methods on the GPU.

Tutorial
723views
17 years 1 months ago
MATLAB Tutorials
Set of MATLB tutorials covers the following topics: programming in the language of MATLAB, linear algebra, matrix computations, numerical analysis and linear programming with MATLA...
115
Voted

Publication
334views
17 years 2 months ago
ANONAGGREGATE: Anonymizing Data Using Sequential Aggregation
We propose a methodology for anonymization of records by aggregating sequential records. This methodology is applied to real valued, binary, nominal and ordinal data. We propose tw...
Sanjay Bapna, Abirami Radhakrishnan, Aryya Gangopa...
264
Voted
ICDE
2009
IEEE
392views Database» more  ICDE 2009»
17 years 2 months ago
FF-Anonymity: When Quasi-Identifiers Are Missing
Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). This ...
Ada Wai-Chee Fu, Ke Wang, Raymond Chi-Wing Wong, Y...
197
Voted

Publication
576views
17 years 2 months ago
Within-die Process Variations: How Accurately can They Be Statistically Modeled?
Within-die process variations arise during integrated circuit (IC) fabrication in the sub-100nm regime. These variations are of paramount concern as they deviate the performance of...
Brendan Hargreaves, Henrik Hult, Sherief Reda
170
Voted

Lecture Notes
889views
17 years 2 months ago
Future Directions in Computing
Silicon-based electronics is the foundation of computing devices. The computer industry is reaching an important milestone, where physical limits arising from using optical lithogr...
Sherief Reda
269
Voted
ICDE
2008
IEEE
425views Database» more  ICDE 2008»
17 years 2 months ago
NAGA: Searching and Ranking Knowledge
The Web has the potential to become the world’s largest knowledge base. In order to unleash this potential, the wealth of information available on the Web needs to be extracte...
Gjergji Kasneci, Fabian M. Suchanek, Georgiana Ifr...
329
Voted
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
17 years 2 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
282
Voted
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 2 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
381
Voted
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
17 years 2 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...