Sciweavers

330 search results - page 59 / 66
» Recognition of Users' Activities Using Constraint Satisfacti...
Sort
View
SAC
2010
ACM
15 years 5 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
SENSYS
2010
ACM
14 years 9 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
115
Voted
PIMRC
2010
IEEE
14 years 9 months ago
Opportunistic channel access scheme for cognitive radio system based on residual white space distribution
We propose an opportunistic channel access scheme for cognitive radio-enabled secondary networks. In our work, we model the channel occupancy due to Primary User (PU) activity as a...
Manuj Sharma, Anirudha Sahoo
SDM
2012
SIAM
252views Data Mining» more  SDM 2012»
13 years 2 months ago
Learning from Heterogeneous Sources via Gradient Boosting Consensus
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...
Xiaoxiao Shi, Jean-François Paiement, David...
CVPR
2008
IEEE
16 years 1 months ago
Automatic non-rigid registration of 3D dynamic data for facial expression synthesis and transfer
Automatic non-rigid registration of 3D time-varying data is fundamental in many vision and graphics applications such as facial expression analysis, synthesis, and recognition. De...
Sen Wang, Xianfeng David Gu, Hong Qin