Sciweavers

231 search results - page 9 / 47
» Active Preservation
Sort
View
ACSC
2008
IEEE
15 years 4 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
14 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
APLAS
2008
ACM
14 years 11 months ago
Minimal Ownership for Active Objects
Active objects offer a structured approach to concurrency, encapsulating both unshared state and a thread of control. For efficient data transfer, data should be passed by referenc...
Dave Clarke, Tobias Wrigstad, Johan Östlund, ...
ICIP
2009
IEEE
14 years 7 months ago
Optimization on active learning strategy for object category retrieval
Active learning is a framework that has attracted a lot of research interest in the content-based image retrieval (CBIR) in recent years. To be effective, an active learning syste...
David Gorisse, Matthieu Cord, Frédér...
WDAG
2004
Springer
122views Algorithms» more  WDAG 2004»
15 years 2 months ago
Active and Concurrent Topology Maintenance
A central problem for structured peer-to-peer networks is topology maintenance, that is, how to properly update neighbor variables when nodes join and leave the network, possibly c...
Xiaozhou Li, Jayadev Misra, C. Greg Plaxton