Sciweavers

1064 search results - page 187 / 213
» Cryptography from Anonymity
Sort
View
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
14 years 10 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal
ICML
2003
IEEE
14 years 10 months ago
AWESOME: A General Multiagent Learning Algorithm that Converges in Self-Play and Learns a Best Response Against Stationary Oppon
A satisfactory multiagent learning algorithm should, at a minimum, learn to play optimally against stationary opponents and converge to a Nash equilibrium in self-play. The algori...
Vincent Conitzer, Tuomas Sandholm
WWW
2006
ACM
14 years 9 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
CCS
2009
ACM
14 years 9 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
CHI
2008
ACM
14 years 9 months ago
Mischief: supporting remote teaching in developing regions
Mischief is a system to support traditional classroom practices between a remote instructor and a group of collocated students. Meant for developing regions, each student in the c...
Neema Moraveji, Taemie Kim, James Ge, Udai Singh P...