Sciweavers

474 search results - page 31 / 95
» Prioritized Conditional Imperatives: Problems and a New Prop...
Sort
View
145
Voted
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
14 years 12 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
CAIP
2005
Springer
260views Image Analysis» more  CAIP 2005»
15 years 7 months ago
An Illumination Invariant Face Recognition Approach Using Exemplar-Based Synthesis Technique
Abstract. This paper proposes a new method to solve the problem of face recognition under varying illumination conditions. We introduce an exemplar-based technique to decouple and ...
Tele Tan, Thorsten Kühnapfel, Amelyn Wongso, ...
TIME
2006
IEEE
15 years 8 months ago
k-Anonymity in Databases with Timestamped Data
In this paper we extend the notion of k-anonymity in the context of databases with timestamped information in order to naturally define k-anonymous views of temporal data. We als...
Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wa...
CVPR
2010
IEEE
15 years 7 months ago
Polynomial Shape from Shading
We examine the shape from shading problem without boundary conditions as a polynomial system. This view allows, in generic cases, a complete solution for ideal polyhedral objects....
Ady Ecker, Allan Jepson
ICASSP
2009
IEEE
15 years 5 months ago
Learning to maximize signal-to-noise ratio for reverberant speech segregation
Monaural speech segregation in reverberant environments is a very difficult problem. We develop a supervised learning approach by proposing an objective function that directly rel...
Zhaozhang Jin, DeLiang Wang