Sciweavers

3047 search results - page 176 / 610
» A Secure Distributed Search System
Sort
View
137
Voted
IKE
2007
15 years 5 months ago
Bringing Information Retrieval Back To Database Management Systems
Information retrieval emerged as independent research area from traditional database management system more than a decade ago. This was driven by the increasing functional require...
Khaled Nagi
101
Voted
ICPADS
2006
IEEE
15 years 9 months ago
Experiences with Simulations - A Light and Fast Model for Secure Web Applications
Using simulations of a complex system such as a Web Application Server provides us with a tool that allows the running of tests without using the resources needed in a real system...
Ramon Nou, Jordi Guitart, David Carrera, Jordi Tor...
119
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
SASO
2007
IEEE
15 years 9 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
125
Voted
KDD
2003
ACM
210views Data Mining» more  KDD 2003»
16 years 3 months ago
Privacy-preserving k-means clustering over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key ...
Jaideep Vaidya, Chris Clifton