Sciweavers

73 search results - page 12 / 15
» Constraint Satisfaction Methods for Information Personalizat...
Sort
View
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 1 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
FGR
2011
IEEE
268views Biometrics» more  FGR 2011»
14 years 3 months ago
Emotion recognition using PHOG and LPQ features
— We propose a method for automatic emotion recognition as part of the FERA 2011 competition [1] . The system extracts pyramid of histogram of gradients (PHOG) and local phase qu...
Abhinav Dhall, Akshay Asthana, Roland Goecke, Tom ...
CIKM
2004
Springer
15 years 5 months ago
Processing content-oriented XPath queries
Document-centric XML collections contain text-rich documents, marked up with XML tags that add lightweight semantics to the text. Querying such collections calls for a hybrid quer...
Börkur Sigurbjörnsson, Jaap Kamps, Maart...
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
16 years 5 days ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
120
Voted
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
15 years 3 months ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...