Sciweavers

469 search results - page 66 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
BMCBI
2011
13 years 2 months ago
PheMaDB: A solution for storage, retrieval, and analysis of high throughput phenotype data
Background: OmniLog™ phenotype microarrays (PMs) have the capability to measure and compare the growth responses of biological samples upon exposure to hundreds of growth condit...
Wenling E. Chang, Keri Sarver, Brandon W. Higgs, T...
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
VL
2008
IEEE
105views Visual Languages» more  VL 2008»
14 years 2 months ago
What's in a mashup? And why? Studying the perceptions of web-active end users
Mashups – web applications that integrate multiple data sources or APIs into one interface – have attracted considerable attention in recent years. The availability of web-bas...
Nan Zang, Mary Beth Rosson
WWW
2008
ACM
14 years 8 months ago
Can chinese web pages be classified with english data source?
As the World Wide Web in China grows rapidly, mining knowledge in Chinese Web pages becomes more and more important. Mining Web information usually relies on the machine learning ...
Xiao Ling, Gui-Rong Xue, Wenyuan Dai, Yun Jiang, Q...
CIKM
2009
Springer
14 years 2 months ago
Compressing tags to find interesting media groups
On photo sharing websites like Flickr and Zooomr, users are offered the possibility to assign tags to their uploaded pictures. Using these tags to find interesting groups of sem...
Matthijs van Leeuwen, Francesco Bonchi, Börku...