Sciweavers

1457 search results - page 158 / 292
» Privacy Challenges for Database Systems
Sort
View
CIKM
2008
Springer
15 years 6 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
TDM
2004
122views Database» more  TDM 2004»
15 years 5 months ago
Retrieval Using Structure for Question Answering
This paper examines the use of XML for modern extractionbased question answering (QA). We feel that the XML community has taken too narrow a view of structured retrieval, and that...
Paul Ogilvie
JUCS
2008
98views more  JUCS 2008»
15 years 4 months ago
Spatial Queries in Road Networks Based on PINE
: Over the last decade, due to the rapid developments in information technology (IT), a new breed of information systems has appeared such as geographic information systems that in...
Maytham Safar
131
Voted
ICIP
2004
IEEE
16 years 5 months ago
Separating useful from useless image variation for face recognition
For a general purpose face recognition system one of the largest challenge is to separate useful identity related from useless variations in the image data due to nuisance variabl...
Peter Kalocsai
ICMCS
2007
IEEE
140views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Suspicious Behavior Detection in Public Transport by Fusion of Low-Level Video Descriptors
Recently great interest has been shown in the visual surveillance of public transportation systems. The challenge is the automated analysis of passenger’s behaviors with a set o...
Dejan Arsic, Björn Schuller, Gerhard Rigoll