Sciweavers

528 search results - page 66 / 106
» Introducing records by refactoring
Sort
View
ICDCS
2011
IEEE
13 years 9 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
92
Voted
CVPR
2009
IEEE
16 years 4 months ago
Pedestrian Detection: A Benchmark
Pedestrian detection is a key problem in computer vision, with several applications including robotics, surveillance and automotive safety. Much of the progress of the past few ...
Bernt Schiele, Christian Wojek, Pietro Perona, Pio...
ICCV
2009
IEEE
1190views Computer Vision» more  ICCV 2009»
16 years 2 months ago
You'll never walk alone: modeling social behavior for multi-target tracking
Object tracking typically relies on a dynamic model to predict the object’s location from its past trajectory. In crowded scenarios a strong dynamic model is particularly impo...
S. Pellegrini, A. Ess, K. Schindler, L. van Gool
CVPR
2007
IEEE
15 years 11 months ago
Microphone Arrays as Generalized Cameras for Integrated Audio Visual Processing
Combinations of microphones and cameras allow the joint audio visual sensing of a scene. Such arrangements of sensors are common in biological organisms and in applications such a...
Adam O'Donovan, Ramani Duraiswami, Jan Neumann
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
15 years 11 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa