Sciweavers

1640 search results - page 72 / 328
» Deriving Private Information from Randomized Data
Sort
View
HPCA
2006
IEEE
15 years 10 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
NIPS
2004
14 years 11 months ago
An Information Maximization Model of Eye Movements
We propose a sequential information maximization model as a general strategy for programming eye movements. The model reconstructs high-resolution visual information from a sequen...
Laura Walker Renninger, James M. Coughlan, Preeti ...
FTDB
2008
82views more  FTDB 2008»
14 years 10 months ago
Information Extraction
The automatic extraction of information from unstructured sources has opened up new avenues for querying, organizing, and analyzing data by drawing upon the clean semantics of str...
Sunita Sarawagi
FSS
2011
93views more  FSS 2011»
14 years 4 months ago
Upper and lower probabilities induced by a fuzzy random variable
We review two existing interpretations of fuzzy random variables. In the first one, the fuzzy random variable is viewed as a linguistic random variable. In the second case, it re...
Inés Couso, Luciano Sánchez
ICECCS
2010
IEEE
153views Hardware» more  ICECCS 2010»
14 years 10 months ago
Patterns for Modelling Time and Consistency in Business Information Systems
Abstract— Maintaining semantic consistency of data is a significant problem in distributed information systems, particularly those on which a business may depend. Our current wo...
Jeremy W. Bryans, John S. Fitzgerald, Alexander Ro...