Sciweavers

21 search results - page 4 / 5
» Statistical and Fuzzy Approach for Database Security
Sort
View
ICMCS
2009
IEEE
189views Multimedia» more  ICMCS 2009»
13 years 3 months ago
Efficient human action recognition by luminance field trajectory and geometry information
In recent years the video event understanding is an active research topic, with many applications in surveillance, security, and multimedia search and mining. In this paper we foc...
Haomian Zheng, Zhu Li, Yun Fu
SIGMOD
2008
ACM
164views Database» more  SIGMOD 2008»
14 years 6 months ago
Finding frequent items in probabilistic data
Computing statistical information on probabilistic data has attracted a lot of attention recently, as the data generated from a wide range of data sources are inherently fuzzy or ...
Qin Zhang, Feifei Li, Ke Yi
MSR
2010
ACM
13 years 8 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
ETVC
2008
13 years 8 months ago
Sparse Multiscale Patches for Image Processing
Abstract. This paper presents a framework to define an objective measure of the similarity (or dissimilarity) between two images for image processing. The problem is twofold: 1) de...
Paolo Piro, Sandrine Anthoine, Eric Debreuve, Mich...
EUROCRYPT
2006
Springer
13 years 9 months ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...