Sciweavers

201 search results - page 31 / 41
» A Utility-Theoretic Approach to Privacy and Personalization
Sort
View
CVPR
2012
IEEE
13 years 2 months ago
Discriminately decreasing discriminability with learned image filters
In machine learning and computer vision, input signals are often filtered to increase data discriminability. For example, preprocessing face images with Gabor band-pass filters ...
Jacob Whitehill, Javier R. Movellan
CCS
2010
ACM
14 years 12 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
114
Voted
ICPADS
2007
IEEE
15 years 6 months ago
Energy-efficient anonymous multicast in mobile ad-hoc networks
Protecting personal privacy and energy efficiency are two primary concerns for mobile ad hoc networks. However, no energy-efficient multicast algorithm designed for preserving ano...
Jung-Chun Kao, Radu Marculescu
HUC
2004
Springer
15 years 5 months ago
Reminding About Tagged Objects Using Passive RFIDs
People often misplace objects they care about. We present a system that generates reminders about objects left behind by tagging those objects with passive RFID tags. Readers posit...
Gaetano Borriello, Waylon Brunette, Matthew Hall, ...
AAAI
1996
15 years 1 months ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski