Sciweavers

288 search results - page 25 / 58
» Estimating the maximum information leakage
Sort
View
CVPR
2000
IEEE
15 years 3 months ago
Statistical Shape Influence in Geodesic Active Contours
A novel method of incorporating shape information into the image segmentation process is presented. We introduce a representation for deformable shapes and define a probability di...
Michael E. Leventon, W. Eric L. Grimson, Olivier D...
BMCBI
2006
119views more  BMCBI 2006»
14 years 12 months ago
LS-NMF: A modified non-negative matrix factorization algorithm utilizing uncertainty estimates
Background: Non-negative matrix factorisation (NMF), a machine learning algorithm, has been applied to the analysis of microarray data. A key feature of NMF is the ability to iden...
Guoli Wang, Andrew V. Kossenkov, Michael F. Ochs
PLDI
2010
ACM
15 years 9 months ago
The Reachability-Bound Problem
We define the reachability-bound problem to be the problem of finding a symbolic worst-case bound on the number of times a given control location inside a procedure is visited in ...
Sumit Gulwani, Florian Zuleger
79
Voted
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 5 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
VLDB
2004
ACM
134views Database» more  VLDB 2004»
15 years 5 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik