Sciweavers

921 search results - page 151 / 185
» An Anthropometric Face Model Using Variational Techniques
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
81
Voted
CEC
2009
IEEE
15 years 4 months ago
An evaluation of Differential Evolution in software test data generation
— One of the main tasks software testing involves is the generation of the test inputs to be used during the test. Due to its expensive cost, the automation of this task has beco...
Ricardo Landa Becerra, Ramón Sagarna, Xin Y...
86
Voted
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
15 years 3 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...
IEEEPACT
2003
IEEE
15 years 2 months ago
Biomedical Computing and Visualization
Computers have changed the way we live, work, and even recreate. Now, they are transforming how we think about and treat human disease. In particular, advanced techniques in biome...
Chris Johnson
66
Voted
ROBOCUP
1997
Springer
96views Robotics» more  ROBOCUP 1997»
15 years 1 months ago
The RoboCup Synthetic Agent Challenge 97
RoboCup Challenge offers a set of challenges for intelligent agent researchers using a friendly competition in a dynamic, real-time, multiagent domain. While RoboCup in general en...
Hiroaki Kitano, Milind Tambe, Peter Stone, Manuela...