Sciweavers

198 search results - page 12 / 40
» Evidence-invariant Sensitivity Bounds
Sort
View
TMI
2008
108views more  TMI 2008»
14 years 10 months ago
Estimation and Statistical Bounds for Three-Dimensional Polar Shapes in Diffuse Optical Tomography
Abstract--Voxel-based reconstructions in diffuse optical tomography (DOT) using a quadratic regularization functional tend to produce very smooth images due to the attenuation of h...
Gregory Boverman, Eric L. Miller, Dana H. Brooks, ...
81
Voted
CORR
2010
Springer
134views Education» more  CORR 2010»
14 years 11 months ago
Large Margin Multiclass Gaussian Classification with Differential Privacy
As increasing amounts of sensitive personal information is aggregated into data repositories, it has become important to develop mechanisms for processing the data without revealin...
Manas A. Pathak, Bhiksha Raj
96
Voted
NSDI
2010
15 years 9 days ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
RTCSA
2000
IEEE
15 years 3 months ago
Tracking Real-Time Systems Requirements
One of the hard problems in maintaining real-time systems requirements is to keep track of the impact of resource usage on the applications. Often times, it is not sufficient to ...
Aloysius K. Mok
88
Voted
CCS
2008
ACM
15 years 25 days ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun