Sciweavers

26 search results - page 4 / 6
» Experiments with Queries over Encrypted Data Using Secret Sh...
Sort
View
CIKM
2008
Springer
13 years 9 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 9 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 7 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...
IPPS
2003
IEEE
14 years 22 days ago
Transparent Query Caching in Peer-to-Peer Overlay Networks
Peer-to-peer (p2p) systems such as Gnutella and KaZaa are routinely used by millions of people for sharing music and many other files over the Internet, and they account for a si...
Sunil Patro, Y. Charlie Hu
SIGIR
2011
ACM
12 years 10 months ago
Learning search tasks in queries and web pages via graph regularization
As the Internet grows explosively, search engines play a more and more important role for users in effectively accessing online information. Recently, it has been recognized that ...
Ming Ji, Jun Yan, Siyu Gu, Jiawei Han, Xiaofei He,...