Sciweavers

438 search results - page 88 / 88
» Shallow Dependency Labeling
Sort
View
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
12 years 9 months ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
CMIG
2011
168views more  CMIG 2011»
12 years 9 months ago
Comparing axial CT slices in quantized N-dimensional SURF descriptor space to estimate the visible body region
In this paper, a method is described to automatically estimate the visible body region of a computed tomography (CT) volume image. In order to quantify the body region, a body coo...
Johannes Feulner, Shaohua Kevin Zhou, Elli Angelop...
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
12 years 8 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala