Sciweavers

340 search results - page 25 / 68
» Computationally Private Information Retrieval with Polylogar...
Sort
View
SAC
2005
ACM
14 years 10 days ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
WISEC
2010
ACM
14 years 2 days ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
TOG
2012
279views Communications» more  TOG 2012»
11 years 9 months ago
Sketch-based shape retrieval
We develop a system for 3D object retrieval based on sketched feature lines as input. For objective evaluation, we collect a large number of query sketches from human users that a...
Mathias Eitz, Ronald Richter, Tamy Boubekeur, Kris...
SAC
2004
ACM
14 years 5 days ago
The eduSource Communication Language: implementing open network for learning repositories and services
Interoperability is one of the main issues in creating a networked system of repositories The approaches range from simply forcing one metadata standard on all participating repos...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
PODC
2009
ACM
14 years 7 months ago
Simple and efficient asynchronous byzantine agreement with optimal resilience
Consider a completely asynchronous network consisting of n parties where every two parties are connected by a private channel. An adversary At with unbounded computing power activ...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan