Sciweavers

231 search results - page 9 / 47
» Active Preservation
Sort
View
ACSC
2008
IEEE
15 years 6 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 1 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
APLAS
2008
ACM
15 years 1 months ago
Minimal Ownership for Active Objects
Active objects offer a structured approach to concurrency, encapsulating both unshared state and a thread of control. For efficient data transfer, data should be passed by referenc...
Dave Clarke, Tobias Wrigstad, Johan Östlund, ...
ICIP
2009
IEEE
14 years 9 months ago
Optimization on active learning strategy for object category retrieval
Active learning is a framework that has attracted a lot of research interest in the content-based image retrieval (CBIR) in recent years. To be effective, an active learning syste...
David Gorisse, Matthieu Cord, Frédér...
WDAG
2004
Springer
122views Algorithms» more  WDAG 2004»
15 years 5 months ago
Active and Concurrent Topology Maintenance
A central problem for structured peer-to-peer networks is topology maintenance, that is, how to properly update neighbor variables when nodes join and leave the network, possibly c...
Xiaozhou Li, Jayadev Misra, C. Greg Plaxton