Sciweavers

1061 search results - page 126 / 213
» A general definition of malware
Sort
View
EUSFLAT
2009
214views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Non-additive Robust Ordinal Regression with Choquet integral, Bipolar and Level Dependent Choquet integrals
Abstract-- Choquet integral has proved to be an effective aggregation model in multiple criteria decision analysis when interactions between criteria have to be taken into consider...
Silvia Angilella, Salvatore Greco, Benedetto Matar...
CVPR
2007
IEEE
16 years 1 months ago
Segmenting Images on the Tensor Manifold
In this note, we propose a method to perform segmentation on the tensor manifold, that is, the space of positive definite matrices of given dimension. In this work, we explicitly ...
Yogesh Rathi, Allen Tannenbaum, Oleg V. Michailovi...
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
16 years 1 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa
ICDE
2005
IEEE
101views Database» more  ICDE 2005»
16 years 1 months ago
GPIVOT: Efficient Incremental Maintenance of Complex ROLAP Views
Data warehousing and on-line analytical processing (OLAP) are essential for decision support applications. Common OLAP operations include for example drill down, roll up, pivot an...
Songting Chen, Elke A. Rundensteiner
MICCAI
2009
Springer
16 years 1 months ago
Diffusion Tensor Field Registration in the Presence of Uncertainty
We propose a novel method for deformable tensor?to?tensor registration of Diffusion Tensor Imaging (DTI) data. Our registration method considers estimated diffusion tensors as norm...
M. Okan Irfanoglu, Cheng Guan Koay, Sinisa Pajev...