Sciweavers

121 search results - page 14 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
ESORICS
2006
Springer
14 years 1 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CEAS
2008
Springer
13 years 11 months ago
Filtering Email Spam in the Presence of Noisy User Feedback
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
D. Sculley, Gordon V. Cormack
ATAL
2005
Springer
13 years 11 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
DOCENG
2008
ACM
13 years 11 months ago
Automated repurposing of implicitly structured documents
: From the least to most prominent elements, documents are arranged in a tacit visual hierarchy. This is essential for document scanning and comprehension. This conceptual structur...
Helen Balinsky, Anthony Wiley, Michael Rhodes, Alf...
INFOSCALE
2007
ACM
13 years 11 months ago
BUST: enabling scalable service orchestration
Service-Orientation (SO) is a design and integration paradigm that is based on the notion of well defined, loosely coupled services. Within SO, services are viewed as computation...
Dong Liu, Ralph Deters