Sciweavers

2386 search results - page 365 / 478
» Database Security 2000
Sort
View
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
16 years 9 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
13 years 13 days ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
CVPR
2001
IEEE
15 years 12 months ago
3D Object Recognition from Range Images using Local Feature Histograms
This paper explores a view-based approach to recognize free-form objects in range images. We are using a set of local features that are easy to calculate and robust to partial occ...
Bastian Leibe, Bernt Schiele, Günter Hetzel, ...
ICCV
2003
IEEE
15 years 12 months ago
Unified Subspace Analysis for Face Recognition
We propose a face difference model that decomposes face difference into three components, intrinsic difference, transformation difference, and noise. Using the face difference mod...
Xiaogang Wang, Xiaoou Tang
ICIP
2000
IEEE
15 years 11 months ago
Region-Based Image Retrieval
Content-based image retrieval, which provides convenient ways to retrieve images from large image databases, has been studied actively. While many previous image retrieval techniq...
Jun-Wei Hsieh, W. Eric L. Grimson, Cheng-Chin Chia...