Sciweavers

5752 search results - page 885 / 1151
» Informative Labeling Schemes
Sort
View
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
PAMI
2012
13 years 7 months ago
Trainable Convolution Filters and Their Application to Face Recognition
—In this paper, we present a novel image classification system that is built around a core of trainable filter ensembles that we call Volterra kernel classifiers. Our system trea...
Ritwik Kumar, Arunava Banerjee, Baba C. Vemuri, Ha...
CIKM
2009
Springer
15 years 11 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ISBI
2008
IEEE
15 years 11 months ago
Automated gland and nuclei segmentation for grading of prostate and breast cancer histopathology
Automated detection and segmentation of nuclear and glandular structures is critical for classification and grading of prostate and breast cancer histopathology. In this paper, w...
Shivang Naik, Scott Doyle, Shannon Agner, Anant Ma...
111
Voted
SIGECOM
2004
ACM
104views ECommerce» more  SIGECOM 2004»
15 years 10 months ago
An economic answer to unsolicited communication
We explore an alternative approach to spam based on economic rather than technological or regulatory screening mechanisms. We employ a model of email value which supports two intu...
Thede Loder, Marshall W. van Alstyne, Rick Wash