Toward a method for privacy vulnerability analysis.
Carlos JensenPublished in: CHI Extended Abstracts (2004)
Keyphrases
- detection method
- preprocessing
- dynamic programming
- high accuracy
- experimental evaluation
- pairwise
- data mining
- computationally efficient
- main contribution
- support vector machine
- optimization method
- fully automatic
- synthetic data
- optimization algorithm
- theoretical analysis
- probabilistic model
- multiresolution
- image retrieval
- training data
- image processing