Sciweavers

5263 search results - page 873 / 1053
» Open Constraint Optimization
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 5 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICDE
2007
IEEE
205views Database» more  ICDE 2007»
16 years 5 months ago
Multi-source Skyline Query Processing in Road Networks
Skyline query processing has been investigated extensively in recent years, mostly for only one query reference point. An example of a single-source skyline query is to find hotel...
Ke Deng, Xiaofang Zhou, Heng Tao Shen
ICDE
2002
IEEE
129views Database» more  ICDE 2002»
16 years 5 months ago
Active XQuery
Besides being adopted as the new interchange format for the Internet, XML is finding increasing acceptance as a native data repository language. In order to make XML repositories ...
Angela Bonifati, Daniele Braga, Alessandro Campi, ...
MICCAI
2008
Springer
16 years 5 months ago
Active Volume Models with Probabilistic Object Boundary Prediction Module
We propose a novel Active Volume Model (AVM) which deforms in a free-form manner to minimize energy. Unlike Snakes and level-set active contours which only consider curves or surfa...
Tian Shen, Yaoyao Zhu, Xiaolei Huang, Junzhou H...
ICPR
2006
IEEE
16 years 5 months ago
Using Specularities to Recover Multiple Light Sources in the Presence of Texture
Recovering multiple point light sources from a sparse set of photographs in which objects of unknown texture can move is challenging. This is because both diffuse and specular ref...
Pascal Lagger, Pascal Fua