Sciweavers

469 search results - page 78 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
EDBT
2008
ACM
111views Database» more  EDBT 2008»
14 years 7 months ago
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
Micro-data protection is a hot topic in the field of Statistical Disclosure Control (SDC), that has gained special interest after the disclosure of 658000 queries by the AOL searc...
Agusti Solanas, Francesc Sebé, Josep Doming...
MMDB
2003
ACM
178views Multimedia» more  MMDB 2003»
14 years 26 days ago
Video query processing in the VDBMS testbed for video database research
The increased use of video data sets for multimedia-based applications has created a demand for strong video database support, including efficient methods for handling the content...
Walid G. Aref, Moustafa A. Hammad, Ann Christine C...
SCCC
2000
IEEE
13 years 12 months ago
A Genetic Classifier Tool
Knowledge discovery is the most desirable end product of an enterprise information system. Researches from different areas recognize that a new generation of intelligent tools for...
Aurora T. R. Pozo, Mozart Hasse
PETRA
2010
ACM
13 years 11 months ago
Context-aware optimized information dissemination in large scale vehicular networks
Context-aware inter-vehicular communication is considered to be vital for inducing intelligence through the use of embedded computing devices inside vehicles. Vehicles in a scalab...
Yves Vanrompay, Ansar-Ul-Haque Yasar, Davy Preuven...
MTA
1998
157views more  MTA 1998»
13 years 7 months ago
Brahma: Browsing and Retrieval Architecture for Hierarchical Multimedia Annotation
Traditional browsing of large multimedia documents (e.g., video, audio) is primarily sequential. In the absence of an index structure browsing and searching for relevant informatio...
Asit Dan, Dinkar Sitaram, Junehwa Song