Sciweavers

22 search results - page 4 / 5
» Clustering under Perturbation Resilience
Sort
View
ICASSP
2011
IEEE
12 years 8 months ago
An unconstrained method for lip detection in color images
The use of visual information derived from accurate lip extraction, can provide features invariant to noise perturbation for speech recognition systems and can be also used in a w...
Evangelos Skodras, Nikolaos D. Fakotakis
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 6 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
ISCC
2005
IEEE
13 years 10 months ago
Hierarchical Peer-to-Peer Networks Using Lightweight SuperPeer Topologies
The use of SuperPeers has been proposed to improve the performance of both Structured and Unstructured Peer-toPeer (P2P) Networks. In this paper, we study the performance of Yao-G...
Michael Kleis, Eng Keong Lua, Xiaoming Zhou
BMCBI
2007
194views more  BMCBI 2007»
13 years 5 months ago
A meta-data based method for DNA microarray imputation
Background: DNA microarray experiments are conducted in logical sets, such as time course profiling after a treatment is applied to the samples, or comparisons of the samples unde...
Rebecka Jörnsten, Ming Ouyang, Hui-Yu Wang
ISI
2008
Springer
13 years 5 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh