Sciweavers

5344 search results - page 118 / 1069
» Privacy-Preserving Set Operations
Sort
View
INFORMATICALT
2008
162views more  INFORMATICALT 2008»
15 years 2 months ago
Vague Rough Set Techniques for Uncertainty Processing in Relational Database Model
Abstract. The study of databases began with the design of efficient storage and data sharing techniques for large amount of data. This paper concerns the processing of imprecision ...
Karan Singh, Samajh Singh Thakur, Mangi Lal
92
Voted
JCST
2006
65views more  JCST 2006»
15 years 2 months ago
P-Tree Structures and Event Horizon: Efficient Event-Set Implementations
This paper describes efficient data structures, namely the Indexed P-tree, Block P-tree, and Indexed-Block P-tree (or IP-tree, BP-tree, and IBP-tree, respectively, for short), for...
Katerina Asdre, Stavros D. Nikolopoulos
120
Voted
INFORMATICALT
2007
106views more  INFORMATICALT 2007»
15 years 2 months ago
Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition
This paper describes a framework for making up a set of syllables and phonemes that subsequently is used in the creation of acoustic models for continuous speech recognition of Lit...
Sigita Laurinciukaite, Antanas Lipeika
CAGD
2005
203views more  CAGD 2005»
15 years 2 months ago
Anisotropic smoothing of point sets,
The use of point sets instead of meshes became more popular during the last years. We present a new method for anisotropic fairing of a point sampled surface using an anisotropic ...
Carsten Lange, Konrad Polthier
131
Voted
ASIACRYPT
2010
Springer
15 years 17 days ago
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik