Sciweavers

3395 search results - page 612 / 679
» Learning to efficiently rank
Sort
View
ESORICS
2006
Springer
15 years 7 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
FC
2006
Springer
94views Cryptology» more  FC 2006»
15 years 7 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
GECCO
2006
Springer
192views Optimization» more  GECCO 2006»
15 years 7 months ago
Optimising cancer chemotherapy using an estimation of distribution algorithm and genetic algorithms
This paper presents a methodology for using heuristic search methods to optimise cancer chemotherapy. Specifically, two evolutionary algorithms - Population Based Incremental Lear...
Andrei Petrovski, Siddhartha Shakya, John A. W. Mc...
HUMO
2000
Springer
15 years 7 months ago
Modeling the Constraints of Human Hand Motion
Hand motion capturing is one of the most important parts of gesture interfaces. Many current approaches to this task generally involve a formidable nonlinear optimization problem ...
John Y. Lin, Ying Wu, Thomas S. Huang
134
Voted
SIGUCCS
2000
ACM
15 years 7 months ago
Knowledge Management: A Cookbook for Beginners
Knowledge Management is a necessary and integral part of an effective and successful support organization, yet it is also a buzzword that is perhaps over-hyped and over-used. How ...
Geoffrey Marsh