Sciweavers

1640 search results - page 53 / 328
» Deriving Private Information from Randomized Data
Sort
View
IDEAS
2007
IEEE
128views Database» more  IDEAS 2007»
15 years 4 months ago
Streaming Random Forests
Many recent applications deal with data streams, conceptually endless sequences of data records, often arriving at high flow rates. Standard data-mining techniques typically assu...
Hanady Abdulsalam, David B. Skillicorn, Patrick Ma...
IVS
2006
127views more  IVS 2006»
14 years 9 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
ICASSP
2011
IEEE
14 years 1 months ago
Bayesian integration of audio and visual information for multi-target tracking using a CB-member filter
A new method is presented for integration of audio and visual information in multiple target tracking applications. The proposed approach uses a Bayesian filtering formulation an...
Reza Hoseinnezhad, Ba-Ngu Vo, Ba-Tuong Vo, David S...
SIGIR
2006
ACM
15 years 3 months ago
Answering complex questions with random walk models
We present a novel framework for answering complex questions that relies on question decomposition. Complex questions are decomposed by a procedure that operates on a Markov chain...
Sanda M. Harabagiu, V. Finley Lacatusu, Andrew Hic...
100
Voted
ICASSP
2011
IEEE
14 years 1 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...