Sciweavers

469 search results - page 57 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
AAAI
2008
13 years 10 months ago
A Utility-Theoretic Approach to Privacy and Personalization
Online services such as web search, news portals, and ecommerce applications face the challenge of providing highquality experiences to a large, heterogeneous user base. Recent ef...
Andreas Krause, Eric Horvitz
SEMWEB
2007
Springer
14 years 1 months ago
Tag Mediated Society with SCOT Ontology
Abstract. In this paper we give an overview of the int.ere.st for a social tagging, bookmarking, and sharing service. It is based on the SCOT ontology. The SCOT ontology can repres...
Hak Lae Kim, Sung-Kwon Yang, Seung-Jae Song, John ...
ICMCS
2010
IEEE
210views Multimedia» more  ICMCS 2010»
13 years 8 months ago
A framework for extracting musical similarities from peer-to-peer networks
The usage of peer-to-peer (p2p) networks for music information retrieval (MIR) tasks is gaining momentum. P2P file sharing networks can be used for collecting both search queries ...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel, Ela...
UAI
1996
13 years 9 months ago
Learning Equivalence Classes of Bayesian Network Structures
Two Bayesian-network structures are said to be equivalent if the set of distributions that can be represented with one of those structures is identical to the set of distributions...
David Maxwell Chickering
JBI
2004
171views Bioinformatics» more  JBI 2004»
13 years 9 months ago
Consensus Clustering and Functional Interpretation of Gene Expression Data
Microarray analysis using clustering algorithms can suffer from lack of inter-method consistency in assigning related gene-expression profiles to clusters. Obtaining a consensus s...
Paul Kellam, Stephen Swift, Allan Tucker, Veronica...