Sciweavers

187 search results - page 19 / 38
» Constrained 1-Spectral Clustering
Sort
View
122
Voted
SASO
2007
IEEE
15 years 6 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
SAC
2010
ACM
15 years 5 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
GD
2008
Springer
15 years 24 days ago
Topology Preserving Constrained Graph Layout
Abstract. Constrained graph layout is a recent generalisation of forcedirected graph layout which allows constraints on node placement. We give a constrained graph layout algorithm...
Tim Dwyer, Kim Marriott, Michael Wybrow
ECCV
2008
Springer
16 years 1 months ago
Extracting Moving People from Internet Videos
Abstract. We propose a fully automatic framework to detect and extract arbitrary human motion volumes from real-world videos collected from YouTube. Our system is composed of two s...
Juan Carlos Niebles, Bohyung Han, Andras Ferencz, ...
PKDD
2007
Springer
114views Data Mining» more  PKDD 2007»
15 years 5 months ago
Robust Visual Mining of Data with Error Information
Abstract. Recent results on robust density-based clustering have indicated that the uncertainty associated with the actual measurements can be exploited to locate objects that are ...
Jianyong Sun, Ata Kabán, Somak Raychaudhury