Sciweavers

219 search results - page 7 / 44
» Nearly Private Information Retrieval
Sort
View
DBSEC
2010
101views Database» more  DBSEC 2010»
13 years 9 months ago
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the specific query data to the server. Computational Private Informa...
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
DELOS
2000
13 years 9 months ago
Intelligent Information Retrieval in a Digital Library Service
We present the Private Digital Library (PDL) project that represents a service of the Corporate Digital Library (CDL) prototype. The main ideas underlying this project are the foll...
Giovanni Semeraro, Fabio Abbattista, Nicola Fanizz...
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
14 years 8 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
ECIR
2010
Springer
13 years 9 months ago
BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment
Abstract. Finding near-duplicate images is a task often found in Multimedia Information Retrieval (MIR). Toward this effort, we propose a novel idea by bridging two seemingly unrel...
Hung-sik Kim, Hau-Wen Chang, Jeongkyu Lee, Dongwon...
CCS
2004
ACM
14 years 28 days ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon