Sciweavers

121 search results - page 14 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
ESORICS
2006
Springer
15 years 3 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CEAS
2008
Springer
15 years 1 months ago
Filtering Email Spam in the Presence of Noisy User Feedback
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
D. Sculley, Gordon V. Cormack
ATAL
2005
Springer
15 years 1 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
DOCENG
2008
ACM
15 years 1 months ago
Automated repurposing of implicitly structured documents
: From the least to most prominent elements, documents are arranged in a tacit visual hierarchy. This is essential for document scanning and comprehension. This conceptual structur...
Helen Balinsky, Anthony Wiley, Michael Rhodes, Alf...
INFOSCALE
2007
ACM
15 years 1 months ago
BUST: enabling scalable service orchestration
Service-Orientation (SO) is a design and integration paradigm that is based on the notion of well defined, loosely coupled services. Within SO, services are viewed as computation...
Dong Liu, Ralph Deters