Sciweavers

4272 search results - page 745 / 855
» A Case for Automatic System Evaluation
Sort
View
TKDE
2008
122views more  TKDE 2008»
14 years 9 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
CVPR
2009
IEEE
16 years 5 months ago
Pedestrian Detection: A Benchmark
Pedestrian detection is a key problem in computer vision, with several applications including robotics, surveillance and automotive safety. Much of the progress of the past few ...
Bernt Schiele, Christian Wojek, Pietro Perona, Pio...
CVPR
2006
IEEE
15 years 12 months ago
A Simple Bayesian Framework for Content-Based Image Retrieval
We present a Bayesian framework for content-based image retrieval which models the distribution of color and texture features within sets of related images. Given a userspecified ...
Katherine A. Heller, Zoubin Ghahramani
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
15 years 11 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
WWW
2008
ACM
15 years 10 months ago
Which "Apple" are you talking about ?
In a higher level task such as clustering of web results or word sense disambiguation, knowledge of all possible distinct concepts in which an ambiguous word can be expressed woul...
Mandar Rahurkar, Dan Roth, Thomas S. Huang