Sciweavers

469 search results - page 52 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
14 years 1 months ago
Design and Implementation of a Semantic Peer-to-Peer Network
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for large-scale information retrieval and search systems due to scalability, fault-tolera...
Kiyohide Nakauchi, Hiroyuki Morikawa, Tomonori Aoy...
GROUP
2005
ACM
14 years 1 months ago
Searching for expertise in social networks: a simulation of potential strategies
People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this...
Jun Zhang, Mark S. Ackerman
EDBTW
2010
Springer
14 years 2 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
IPPS
2005
IEEE
14 years 1 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif
DEXAW
1999
IEEE
152views Database» more  DEXAW 1999»
13 years 12 months ago
Advanced Metrics for Class-Driven Similarity Search
This paper presents two metrics for the Nearest Neighbor Classifier that share the property of being adapted, i.e. learned, on a set of data. Both metrics can be used for similari...
Paolo Avesani, Enrico Blanzieri, Francesco Ricci