Sciweavers

214 search results - page 42 / 43
» The Filter-Placement Problem and its Application to Minimizi...
Sort
View
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 5 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002
MOBISYS
2007
ACM
14 years 5 months ago
Context-for-wireless: context-sensitive energy-efficient wireless data transfer
Ubiquitous connectivity on mobile devices will enable numerous new applications in healthcare and multimedia. We set out to check how close we are towards ubiquitous connectivity ...
Ahmad Rahmati, Lin Zhong
TRUST
2010
Springer
13 years 10 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
ICIP
2008
IEEE
14 years 7 months ago
Image registration using Adaptive Polar Transform
Image registration is an essential step in many image processing applications that need visual information from multiple images for comparison, integration or analysis. Recently r...
Rittavee Matungka, Yuan F. Zheng, Robert L. Ewing
KDD
2007
ACM
209views Data Mining» more  KDD 2007»
14 years 5 months ago
Temporal causal modeling with graphical granger methods
The need for mining causality, beyond mere statistical correlations, for real world problems has been recognized widely. Many of these applications naturally involve temporal data...
Andrew Arnold, Yan Liu, Naoki Abe