Sciweavers

327 search results - page 58 / 66
» Independence Diagrams: A Technique for Visual Data Mining
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
PVLDB
2010
95views more  PVLDB 2010»
14 years 8 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
ISVC
2010
Springer
14 years 8 months ago
A Human Inspired Local Ratio-Based Algorithm for Edge Detection in Fluorescent Cell Images
Abstract. We have developed a new semi-automated method for segmenting images of biological cells seeded at low density on tissue culture substrates, which we use to improve the ge...
Joe Chalfoun, Alden Dima, Adele P. Peskin, John T....
CHI
2010
ACM
15 years 2 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...
BIBM
2009
IEEE
190views Bioinformatics» more  BIBM 2009»
14 years 7 months ago
A Fast, Semi-automatic Brain Structure Segmentation Algorithm for Magnetic Resonance Imaging
Abstract--Medical image segmentation has become an essential technique in clinical and research-oriented applications. Because manual segmentation methods are tedious, and fully au...
Kevin Karsch, Qing He, Ye Duan