Filters








12 Hits in 2.6 sec

PrivCheck

Dingqi Yang, Daqing Zhang, Bingqing Qu, Philippe Cudré-Mauroux
2016 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '16  
Since users often give LBS providers access to both their historical check-in data and future check-in streams, we develop two data obfuscation methods for historical and online check-in publishing, respectively  ...  With the widespread adoption of smartphones, we have observed an increasing popularity of Location-Based Services (LBSs) in the past decade.  ...  We advocate such an approach in this paper, and adopt the ranking tensor factorization algorithm from [44] to come up with a ranking list of activities for a user given her context.  ... 
doi:10.1145/2971648.2971685 dblp:conf/huc/YangZQC16 fatcat:gnkq7tdgyrgq5nxsf5eqahj5la

Large-Scale Deep Learning Framework on FPGA for Fingerprint-Based Indoor Localization

Chang LIU, Chun WANG, Juan LUO
2020 IEEE Access  
In addition to the high requirement of accuracy, an indoor localization system should also be low cost, low power consumption, and ubiquitous availability in mobile devices.  ...  First, a scalable stacked denoising auto-encoder is introduced to extract features from the fingerprint database for robustness and accuracy.  ...  Due to the wide availability and prevalent infrastructure, WiFi-based indoor localization has become an attractive approach of supreme importance, to support adaptive and convenient LBSs of variety [11  ... 
doi:10.1109/access.2020.2985162 fatcat:dflykan6dbd5vo57rlqxyeh4bi

An Observatory Framework for Metropolitan Change: Understanding Urban Social–Ecological–Technical Systems in Texas and Beyond

R. Patrick Bixler, Katherine Lieberknecht, Fernanda Leite, Juliana Felkner, Michael Oden, Steven M. Richter, Samer Atshan, Alvaro Zilveti, Rachel Thomas
2019 Sustainability  
cohesion, and an ecosystem to support them—are exposed to unprecedented risk.  ...  An integrative and holistic approach is necessary to develop effective sustainability science that synthesizes different sources of knowledge, relevant disciplines, multi-sectoral alliances, and connections  ...  A successful synthesis of the two approaches would combine the smart city's access to rapidly proliferating and abundant new data flows with the wise city's attention to ecological and cultural context  ... 
doi:10.3390/su11133611 fatcat:n34cobfcnjc65kkemyeuxfftpm

Single-Channel Speech Enhancement Based on Adaptive Low-Rank Matrix Decomposition

Chao Li, Ting Jiang, Sheng Wu, Jianxiao Xie
2020 IEEE Access  
However, they are often severely damaged by ubiquitous background noise. Therefore, the design of an appropriate speech enhancement algorithm is of great importance.  ...  The MCC theory is adopted to provide an additional penalty for the updating of the LMD algorithm.  ... 
doi:10.1109/access.2020.2975069 fatcat:pv5ggenmcjhopezu4jssts4diq

Driven by Data or Derived through Physics? A Review of Hybrid Physics Guided Machine Learning Techniques with Cyber-Physical System (CPS) Focus

Rahul Rai, Chandan K. Sahu
2020 IEEE Access  
We refer to the paradigm that combines MB approaches with ML as hybrid learning methods.  ...  There are mainly two approaches to modeling: Physics/Equation based modeling (Model-Based, MB) and Machine Learning (ML).  ...  The ML learns a mapping between the preprocessed datax and the actual outputs y and predicts the actual output asŷ with an error i given by i = y −ŷ.  ... 
doi:10.1109/access.2020.2987324 fatcat:xaltpychlfcz7cec4jrdadhxem

Recent Advances in Transfer Learning for Cross-Dataset Visual Recognition

Jing Zhang, Wanqing Li, Philip Ogunbona, Dong Xu
2019 ACM Computing Surveys  
This survey not only presents an up-to-date technical review for researchers but also a systematic approach and a reference for a machine-learning practitioner to categorise a real problem and to look  ...  This survey not only presents an up-to-date technical review for researchers, but also a systematic approach and a reference for a machine learning practitioner to categorise a real problem and to look  ...  At training time, we have an access to a large set of training samples {x1, x2, . . . , xN } from both the source and the target domains distributed according to the marginal distributions S(x) and T (  ... 
doi:10.1145/3291124 fatcat:thjzho3xsnfalprmkquldhwpvm

Current challenges in business and IT alignment

Amin Khodabandeh Amiri
2018
of DataX and DataY from an advertisement published on the cover of The Economist (Nov 14-20, 2015) by Oracle to convince SAP Hana (DataY) users to migrate to the Oracle Database (DataX).  ...  An IT infrastructure outage (e.g., hardware failure, database outage, network outage, cloud outage), human error, deliberate shutdown due to unauthorized access concerns, natural disasters, software bugs  ...  A warrant (e.g., faster database operation -> higher long-term value) is an inference license according to which the datum (e.g., DataX provides two times faster database operations) supports the claim  ... 
doi:10.14288/1.0361749 fatcat:7jytnkon7jff5f7pm7nb3hr7vm

Machine learning methods for detecting urinary tract infection and analysing daily living activities in people with dementia

Shirin Enshaeifar, Ahmed Zoha, Severin Skillman, Andreas Markides, Sahr Thomas Acton, Tarek Elsaleh, Mark Kenny, Helen Rostill, Ramin Nilforooshan, Payam Barnaghi, Jose M. Juarez
2019 PLoS ONE  
For this purpose, we have used an Isolation Forest (iForest) technique to create a holistic view of the daily activity patterns.  ...  In addition, we have designed an algorithm for detecting changes in activity patterns to identify early symptoms of cognitive decline or health decline in order to provide personalised and preventative  ...  Acknowledgments We would like to thank our project partners and sponsors for their contributions to the project.  ... 
doi:10.1371/journal.pone.0209909 pmid:30645599 pmcid:PMC6333356 fatcat:ymbof2altzf55cjunllyiafl6e

High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy

Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie McCann
2016 2016 IEEE International Conference on Computer and Information Technology (CIT)  
However, it also brings unprecedented privacy threats to the participants. Local privacy, a variant of differential privacy, is proposed to eliminate privacy concerns.  ...  To the best of our knowledge, this is the first work addressing high-dimensional crowdsourced data publication with local privacy.  ...  Then, we randomly choose an attribute index cluster C to estimate the joint distribution and sample new dataX in the attributes A j , ∀j ∈ C.  ... 
doi:10.1109/cit.2016.57 dblp:conf/IEEEcit/RenYYYYM16 fatcat:zb3cijvymja2pa7ioqynyja7w4

An Observatory Framework for Metropolitan Change: Understanding Urban Social-Ecological-Technical Systems in Texas and Beyond [article]

R. Patrick Bixler, Katherine Lieberknecht, Fernanda Leite, Juliana Felkner, Michael Oden, Steven Richter, Samer Atshan, Alvaro Zilveti, Rachel Thomas, Austin, The University Of Texas At, Austin, The University Of Texas At
2019
cohesion, and an ecosystem to support them—are exposed to unprecedented risk.  ...  An integrative and holistic approach is necessary to develop e ective sustainability science that synthesizes different sources of knowledge, relevant disciplines, multi-sectoral alliances, and connections  ...  We would like to thank Maggie Fitzgerald, Austen Zoutwelle, and Clare Zutz for their contributions to TMO during the summer of 2018.  ... 
doi:10.26153/tsw/2165 fatcat:n5osfvm3unf5hnn34fzztbwlly

Towards a Near Universal Time Series Data Mining Tool: Introducing the Matrix Profile [article]

Chin-Chia Michael Yeh
2020 arXiv   pre-print
In this thesis, we have introduced a near universal time series data mining tool called matrix profile which solves the all-pairs-similarity-search problem and caches the output in an easy-to-access fashion  ...  The last decade has seen a flurry of research on all-pairs-similarity-search (or, self-join) for text, DNA, and a handful of other datatypes, and these systems have been applied to many diverse data mining  ...  Although we do not have access to the original data, it is virtually certain that this is an example of label slop.  ... 
arXiv:1811.03064v2 fatcat:2p5o45bedjfyxei34kgrnliojm

SensorWebs, databases and mining in networked sensing systems International Workshop on SensorWebs, Databases and Mining in Networked Sensing Systems (SWDMNSS)

Yoh Shiraishi, Christian Decker, Koichi Yamada, Hiroki Saito
2007
To cope with this problem, we introduce a declarative network approach to the sensor networks and thus simplifying the rules to be conducted at all nodes.  ...  If we apply conventional data-centric or in-network processing approaches to the networks, we will suffer from constructing per-node complicated rules.  ...  , in order to approach an integrated real world search engine.  ... 
doi:10.5445/ir/1000007249 fatcat:qblg7qeazzguxpot7wtw2m7wnq