Sciweavers

947 search results - page 29 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
DBSEC
2007
89views Database» more  DBSEC 2007»
15 years 2 months ago
Design and Analysis of Querying Encrypted Data in Relational Databases
Security and privacy concerns as well as legal considerations force many companies to encrypt the sensitive data in databases. However, storing the data in an encrypted format enta...
Mustafa Canim, Murat Kantarcioglu
CCS
2010
ACM
15 years 1 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
ICFCA
2004
Springer
15 years 6 months ago
Conceptual Knowledge Processing with Formal Concept Analysis and Ontologies
Abstract. Among many other knowledge representations formalisms, Ontologies and Formal Concept Analysis (FCA) aim at modeling ‘concepts’. We discuss how these two formalisms ma...
Philipp Cimiano, Andreas Hotho, Gerd Stumme, Julie...
ICASSP
2011
IEEE
14 years 5 months ago
cROVER: Improving ROVER using automatic error detection
Recognizer Output Voting Error Reduction (ROVER), is a well-known procedure for decoders’ combination aiming at reducing the Word Error Rate (WER) in transcription applications....
Kacem Abida, Fakhri Karray, Wafa Abida
IPM
2007
145views more  IPM 2007»
15 years 1 months ago
Text mining techniques for patent analysis
Patent documents contain important research results. However, they are lengthy and rich in technical terminology such that it takes a lot of human efforts for analyses. Automatic...
Yuen-Hsien Tseng, Chi-Jen Lin, Yu-I Lin