Sciweavers

219 search results - page 33 / 44
» Nearly Private Information Retrieval
Sort
View
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
SIGIR
2012
ACM
11 years 10 months ago
Task complexity, vertical display and user interaction in aggregated search
Aggregated search is the task of blending results from specialized search services or verticals into the Web search results. While many studies have focused on aggregated search t...
Jaime Arguello, Wan-Ching Wu, Diane Kelly, Ashlee ...
MM
2009
ACM
175views Multimedia» more  MM 2009»
14 years 7 days ago
Near-duplicate video matching with transformation recognition
Nowadays, the issue of near-duplicate video matching has been extensively studied. However, transformation, which is one of the major causes of near-duplicates, has been little di...
Zhipeng Wu, Shuqiang Jiang, Qingming Huang
MM
2010
ACM
175views Multimedia» more  MM 2010»
13 years 7 months ago
Embedded media marker: linking multimedia to paper
An Embedded Media Marker (EMM) is a transparent mark printed on a paper document that signifies the availability of additional media associated with that part of the document. Use...
Qiong Liu, Chunyuan Liao, Lynn Wilcox, Anthony Dun...
WPES
2004
ACM
14 years 1 months ago
Privacy preserving route planning
The number of location-aware mobile devices has been rising for several years. As this trend continues, these devices may be able to use their location information to provide inte...
Keith B. Frikken, Mikhail J. Atallah