Sciweavers

1640 search results - page 72 / 328
» Deriving Private Information from Randomized Data
Sort
View
142
Voted
HPCA
2006
IEEE
16 years 4 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
99
Voted
NIPS
2004
15 years 5 months ago
An Information Maximization Model of Eye Movements
We propose a sequential information maximization model as a general strategy for programming eye movements. The model reconstructs high-resolution visual information from a sequen...
Laura Walker Renninger, James M. Coughlan, Preeti ...
117
Voted
FTDB
2008
82views more  FTDB 2008»
15 years 3 months ago
Information Extraction
The automatic extraction of information from unstructured sources has opened up new avenues for querying, organizing, and analyzing data by drawing upon the clean semantics of str...
Sunita Sarawagi
152
Voted
FSS
2011
93views more  FSS 2011»
14 years 10 months ago
Upper and lower probabilities induced by a fuzzy random variable
We review two existing interpretations of fuzzy random variables. In the first one, the fuzzy random variable is viewed as a linguistic random variable. In the second case, it re...
Inés Couso, Luciano Sánchez
120
Voted
ICECCS
2010
IEEE
153views Hardware» more  ICECCS 2010»
15 years 3 months ago
Patterns for Modelling Time and Consistency in Business Information Systems
Abstract— Maintaining semantic consistency of data is a significant problem in distributed information systems, particularly those on which a business may depend. Our current wo...
Jeremy W. Bryans, John S. Fitzgerald, Alexander Ro...