Sciweavers

1358 search results - page 74 / 272
» Proceedings
Sort
View
107
Voted
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
14 years 10 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
86
Voted
ICIP
2009
IEEE
14 years 10 months ago
Robust extraction of urinary stones from CT data using attribute filters
In medical imaging, anatomical and other structures such as urinary stones, are often extracted with the aid of active contour/surface models. Active surface-based methods have ro...
Georgios K. Ouzounis, Stilianos Giannakopoulos, Co...
65
Voted
AIL
2010
60views more  AIL 2010»
14 years 10 months ago
Network-based filtering for large email collections in E-Discovery
The information overload in E-Discovery proceedings makes reviewing expensive and it increases the risk of failure to produce results on time and consistently. New interactive tec...
Hans Henseler
AISS
2010
142views more  AISS 2010»
14 years 10 months ago
Service-Oriented Business-IT Alignment: A SOA Governance Model
The concept of Service Oriented Architecture (SOA) has had a significant impact not only on software engineering but on the analysis of an organization's business layer as we...
Mohammad Kazem Haki, Maia Wentland Forte
93
Voted
AUSAI
2010
Springer
14 years 10 months ago
Evolutionary Non Photo-Realistic Animations with Triangular Brushstrokes
Abstract. We have developed a method for generating non photorealistic animations of a target image. The animations start as a random collection of triangular strokes on a canvas a...
Ashkan Izadi, Victor Ciesielski, Marsha Berry