Sciweavers

8655 search results - page 1256 / 1731
» Challenges for Trusted Computing
Sort
View
CSCW
2012
ACM
14 years 6 days ago
Organizing without formal organization: group identification, goal setting and social modeling in directing online production
A challenge for many online production communities is to direct their members to accomplish tasks that are important to the group, even when these tasks may not match individual m...
Haiyi Zhu, Robert Kraut, Aniket Kittur
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 4 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
ICIP
2008
IEEE
16 years 6 months ago
Using local regression kernels for statistical object detection
We present a novel approach to the problem of detection of visual similarity between a template image, and patches in a given image. The method is based on the computation of a lo...
Hae Jong Seo, Peyman Milanfar
ICDE
2009
IEEE
115views Database» more  ICDE 2009»
16 years 6 months ago
Efficient Evaluation of Multiple Preference Queries
Consider multiple users searching for a hotel room, based on size, cost, distance to the beach, etc. Users may have variable preferences expressed by different weights on the attri...
Leong Hou U, Nikos Mamoulis, Kyriakos Mouratidis
ICIP
2006
IEEE
16 years 6 months ago
Content Extraction and Summarization of Instructional Videos
This paper presents a robust approach to extracting and summarizing the textual content of instructional videos for handwritten recognition, indexing and retrieval, and other elea...
Tiecheng Liu, Chekuri Choudary
« Prev « First page 1256 / 1731 Last » Next »