Sciweavers

24529 search results - page 267 / 4906
» Computing on Authenticated Data
Sort
View
118
Voted
KDD
1998
ACM
200views Data Mining» more  KDD 1998»
15 years 8 months ago
Fast Computation of 2-Dimensional Depth Contours
"Oneperson's noise is another person's signal." For manyapplications, including the detection of credit card frauds and the monitoringof criminal activities in...
Theodore Johnson, Ivy Kwok, Raymond T. Ng
116
Voted
JMLR
2010
177views more  JMLR 2010»
14 years 10 months ago
Multitask Learning for Brain-Computer Interfaces
Brain-computer interfaces (BCIs) are limited in their applicability in everyday settings by the current necessity to record subjectspecific calibration data prior to actual use of...
Morteza Alamgir, Moritz Grosse-Wentrup, Yasemin Al...
85
Voted
KDD
2003
ACM
111views Data Mining» more  KDD 2003»
16 years 4 months ago
Critical event prediction for proactive management in large-scale computer clusters
Adam J. Oliner, Anand Sivasubramaniam, Irina Rish,...
KDD
2009
ACM
158views Data Mining» more  KDD 2009»
15 years 10 months ago
KissKissBan: a competitive human computation game for image annotation
Chien-Ju Ho, Tao-Hsuan Chang, Jong-Chuan Lee, Jane...
135
Voted
CMS
2003
148views Communications» more  CMS 2003»
15 years 5 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling