Sciweavers

128 search results - page 7 / 26
» Comparing top k lists
Sort
View
CCS
2011
ACM
12 years 7 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
ICS
2005
Tsinghua U.
14 years 27 days ago
High performance support of parallel virtual file system (PVFS2) over Quadrics
Parallel I/O needs to keep pace with the demand of high performance computing applications on systems with ever-increasing speed. Exploiting high-end interconnect technologies to ...
Weikuan Yu, Shuang Liang, Dhabaleswar K. Panda
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
13 years 11 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
TREC
2001
13 years 8 months ago
CL Research Experiments in TREC-10 Question Answering
CL Research's question-answering system (DIMAP-QA) for TREC-10 only slightly extends its semantic relation triple (logical form) technology in which documents are fully parse...
Kenneth C. Litkowski
IUI
2010
ACM
14 years 4 months ago
Rush: repeated recommendations on mobile devices
We present rush as a recommendation-based interaction and visualization technique for repeated item selection from large data sets on mobile touch screen devices. Proposals and ch...
Dominikus Baur, Sebastian Boring, Andreas Butz