Sciweavers

712 search results - page 127 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
STOC
2006
ACM
152views Algorithms» more  STOC 2006»
15 years 10 months ago
Private approximation of search problems
Many approximation algorithms have been presented in the last decades for hard search problems. The focus of this paper is on cryptographic applications, where it is desired to de...
Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb
IJIEM
2010
171views more  IJIEM 2010»
14 years 8 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
SPEECH
2010
122views more  SPEECH 2010»
14 years 4 months ago
Similarity and familiarity: Second language sentence recognition in first- and second-language multi-talker babble
The intelligibility of speech in noisy environments depends not only on the functionality of listeners' peripheral auditory systems, but also on cognitive factors such as the...
Kristin J. Van Engen
CHI
2005
ACM
15 years 10 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
ISI
2003
Springer
15 years 2 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen