Sciweavers

826 search results - page 71 / 166
» Medical Requirements for Data Protection
Sort
View
ISBI
2007
IEEE
15 years 4 months ago
Direct Reconstruction of Spiral Mri Using Least Squares Quantization Table
The least squares quantization table (LSQT) method is proposed to accelerate the direct Fourier transform for reconstructing images from nonuniformly sampled data, similar to the ...
Dong Liang, Edmund Y. Lam, George S. K. Fung
CVPR
2008
IEEE
15 years 11 months ago
Semi-supervised learning of multi-factor models for face de-identification
With the emergence of new applications centered around the sharing of image data, questions concerning the protection of the privacy of people visible in the scene arise. Recently...
Ralph Gross, Latanya Sweeney, Fernando De la Torre...
HASKELL
2008
ACM
14 years 11 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
CCS
2006
ACM
15 years 1 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
15 years 3 months ago
Exploring relationships between genotype and oral cancer development through XCS
In medical research, being able to justify decisions is generally as important as taking the right ones. Interpretability is then one of the chief characteristics a learning algor...
Alessandro Passaro, Flavio Baronti, Valentina Magg...