Sciweavers

497 search results - page 93 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
INFORMATICALT
2006
89views more  INFORMATICALT 2006»
13 years 7 months ago
Investigation of Examples of E-Education Environment for Scientific Collaboration and Distance Graduate Studies, Part 1
The objective is to investigate two emerging information technologies in graduate studies and scientific cooperation. Internet is the first technology. The open source is the secon...
Jonas Mockus
SIGIR
2012
ACM
11 years 9 months ago
Time-sensitive query auto-completion
Query auto-completion (QAC) is a common feature in modern search engines. High quality QAC candidates enhance search experience by saving users time that otherwise would be spent ...
Milad Shokouhi, Kira Radinsky
NDSS
2008
IEEE
14 years 1 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
OOPSLA
2007
Springer
14 years 1 months ago
Component nextgen: a sound and expressive component framework for java
Developing a general component system for a statically typed, object-oriented language is a challenging design problem for two reasons. First, mutually recursive references across...
James Sasitorn, Robert Cartwright
KDD
2002
ACM
183views Data Mining» more  KDD 2002»
14 years 7 months ago
E-CAST: A Data Mining Algorithm for Gene Expression Data
Data clustering methods have been proven to be a successful data mining technique in the analysis of gene expression data. The Cluster affinity search technique (CAST) developed b...
Abdelghani Bellaachia, David Portnoy, Yidong Chen,...