Sciweavers

1610 search results - page 172 / 322
» Identity Based Multisignatures
Sort
View
104
Voted
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
15 years 10 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
CVPR
2010
IEEE
15 years 9 months ago
On Detection of Multiple Object Instances using Hough Transforms
To detect multiple objects of interest, the methods based on Hough transform use non-maxima supression or mode seeking in order to locate and to distinguish peaks in Hough images....
Olga Barinova, Victor Lempitsky, Pushmeet Kohli
94
Voted
HICSS
2010
IEEE
131views Biometrics» more  HICSS 2010»
15 years 7 months ago
Using "Last-Minute" Sales for Vertical Differentiation on the Internet
In Internet based commerce, sellers often use multiple distribution channels for the sale of standard consumer goods. We study a model of second degree price discrimination in whi...
Ori Marom, Abraham Seidmann
100
Voted
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
15 years 7 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
109
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Optimal parameter estimation for model-based quantization
We address optimal model estimation for model-based vector quantization for both the constrained resolution (CR) and constrained entropy (CE) cases. To this purpose we derive unde...
Alexey Ozerov, W. Bastiaan Kleijn