Sciweavers

2705 search results - page 490 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SIGMOD
2001
ACM
124views Database» more  SIGMOD 2001»
16 years 1 months ago
Query Optimization In Compressed Database Systems
Over the last decades, improvements in CPU speed have outpaced improvements in main memory and disk access rates by orders of magnitude, enabling the use of data compression techn...
Zhiyuan Chen, Johannes Gehrke, Flip Korn
124
Voted
ACCV
2009
Springer
15 years 2 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
121
Voted
JTAER
2007
125views more  JTAER 2007»
15 years 1 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
CVPR
2010
IEEE
15 years 6 months ago
Refinement of Digital Elevation Models from Shadowing Cues
In this paper we derive formal constraints relating terrain elevation and observed cast shadows. We show how an optimisation framework can be used to refine surface estimates usin...
James Hogan, William Smith
AAAI
2012
13 years 4 months ago
Discovering Spammers in Social Networks
As the popularity of the social media increases, as evidenced in Twitter, Facebook and China’s Renren, spamming activities also picked up in numbers and variety. On social netwo...
Yin Zhu, Xiao Wang, ErHeng Zhong, Nathan Nan Liu, ...