Sciweavers

8972 search results - page 1787 / 1795
» Private Information Retrieval
Sort
View
INFOCOM
2010
IEEE
13 years 9 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
JASIS
2010
262views more  JASIS 2010»
13 years 9 months ago
New event detection and topic tracking in Turkish
Topic detection and tracking (TDT) applications aim to organize the temporally ordered stories of a news stream according to the events. Two major problems in TDT are new event de...
Fazli Can, Seyit Kocberber, Ozgur Baglioglu, Suley...
RAID
2010
Springer
13 years 9 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
SISAP
2010
IEEE
135views Data Mining» more  SISAP 2010»
13 years 9 months ago
Improving the similarity search of tandem mass spectra using metric access methods
In biological applications, the tandem mass spectrometry is a widely used method for determining protein and peptide sequences from an ”in vitro” sample. The sequences are not...
Jiri Novák, Tomás Skopal, David Hoks...
TKDE
2010
284views more  TKDE 2010»
13 years 9 months ago
Unsupervised Semantic Similarity Computation between Terms Using Web Documents
Abstract— In this work, web-based metrics for semantic similarity computation between words or terms are presented and compared with the state-of-the-art. Starting from the funda...
Elias Iosif, Alexandros Potamianos
« Prev « First page 1787 / 1795 Last » Next »