Sciweavers

1513 search results - page 36 / 303
» A self-describing data transfer model for ITS applications
Sort
View
ASIACRYPT
2007
Springer
15 years 6 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
DKE
2007
130views more  DKE 2007»
14 years 11 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
SIGIR
2008
ACM
14 years 11 months ago
Topic-bridged PLSA for cross-domain text classification
In many Web applications, such as blog classification and newsgroup classification, labeled data are in short supply. It often happens that obtaining labeled data in a new domain ...
Gui-Rong Xue, Wenyuan Dai, Qiang Yang, Yong Yu
TEAA
2005
Springer
105views Hardware» more  TEAA 2005»
15 years 5 months ago
An Efficient Zoning Technique for Multi-dimensional Access Methods
Abstract. In emerging database applications that deal with large sets of multidimensional data, the performance of the query system significantly depends on the performance of its ...
Byunggu Yu, Seon Ho Kim
ESANN
2000
15 years 1 months ago
Distributed clustering and local regression for knowledge discovery in multiple spatial databases
Many large -scale spatial data analysis problems involve an investigation of relationships in heterogeneous databases. In such situations, instead of making predictions uniformly a...
Aleksandar Lazarevic, Dragoljub Pokrajac, Zoran Ob...