Sciweavers

1763 search results - page 192 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
TLCA
2005
Springer
15 years 9 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...
ACSAC
2007
IEEE
15 years 10 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
INTERSPEECH
2010
14 years 11 months ago
Adaptation of a tongue shape model by local feature transformations
Reconstructing the full contour of the tongue from the position of 3 to 4 landmarks on it is useful in articulatory speech work. This can be done with submillimetric accuracy usin...
Chao Qin, Miguel Á. Carreira-Perpiñ&...
136
Voted
EDBT
2004
ACM
122views Database» more  EDBT 2004»
16 years 4 months ago
Sketch-Based Multi-query Processing over Data Streams
Abstract. Recent years have witnessed an increasing interest in designing algorithms for querying and analyzing streaming data (i.e., data that is seen only once in a fixed order) ...
Alin Dobra, Minos N. Garofalakis, Johannes Gehrke,...
SCIA
2009
Springer
305views Image Analysis» more  SCIA 2009»
15 years 10 months ago
A Convex Approach to Low Rank Matrix Approximation with Missing Data
Many computer vision problems can be formulated as low rank bilinear minimization problems. One reason for the success of these problems is that they can be efficiently solved usin...
Carl Olsson, Magnus Oskarsson