Sciweavers

469 search results - page 45 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
MHCI
2007
Springer
14 years 1 months ago
Incidental information and mobile search
There is much interest in providing effective mobile search tools. Our focus is the value of in situ sharing of users’ mobile search activity. The QnotA prototype displays other...
David Arter, George Buchanan, Matt Jones, Richard ...
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 9 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
KDD
2010
ACM
286views Data Mining» more  KDD 2010»
13 years 6 months ago
Nonnegative shared subspace learning and its application to social media retrieval
Although tagging has become increasingly popular in online image and video sharing systems, tags are known to be noisy, ambiguous, incomplete and subjective. These factors can ser...
Sunil Kumar Gupta, Dinh Q. Phung, Brett Adams, Tru...
ATAL
2005
Springer
14 years 1 months ago
Implicit: an agent-based recommendation system for web search
The number of web pages available on Internet increases day after day, and consequently finding relevant information becomes more and more a hard task. However, when we consider ...
Aliaksandr Birukou, Enrico Blanzieri, Paolo Giorgi...
INFOCOM
2010
IEEE
13 years 6 months ago
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Yao Liu, Peng Ning, Huaiyu Dai, An Liu