Sciweavers

7379 search results - page 1259 / 1476
» How Many Clusters
Sort
View
INFOCOM
2012
IEEE
13 years 6 months ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
INFOCOM
2012
IEEE
13 years 6 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
175
Voted
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 6 months ago
Harnessing the wisdom of the crowds for accurate web page clipping
Clipping Web pages, namely extracting the informative clips (areas) from Web pages, has many applications, such as Web printing and e-reading on small handheld devices. Although m...
Lei Zhang, Linpeng Tang, Ping Luo, Enhong Chen, Li...
158
Voted
ICCV
2007
IEEE
16 years 5 months ago
The Joint Manifold Model for Semi-supervised Multi-valued Regression
Many computer vision tasks may be expressed as the problem of learning a mapping between image space and a parameter space. For example, in human body pose estimation, recent rese...
Ramanan Navaratnam, Andrew W. Fitzgibbon, Roberto ...
269
Voted
ICDE
2009
IEEE
135views Database» more  ICDE 2009»
16 years 5 months ago
Space-Constrained Gram-Based Indexing for Efficient Approximate String Search
Abstract-- Answering approximate queries on string collections is important in applications such as data cleaning, query relaxation, and spell checking, where inconsistencies and e...
Alexander Behm, Shengyue Ji, Chen Li, Jiaheng Lu
« Prev « First page 1259 / 1476 Last » Next »