Sciweavers

24188 search results - page 134 / 4838
» Computing on Encrypted Data
Sort
View
149
Voted
COMPSAC
2006
IEEE
15 years 9 months ago
Data Structure and Algorithm in Data Mining: Granular Computing View
This paper discusses foundations of conventional style of rule mining in which rules are extracted from a data table. Rule mining mainly uses the structure of a table, data partit...
Shusaku Tsumoto
DEBU
2006
121views more  DEBU 2006»
15 years 3 months ago
Probabilistic Data Management for Pervasive Computing: The Data Furnace Project
The wide deployment of wireless sensor and RFID (Radio Frequency IDentification) devices is one of the key enablers for next-generation pervasive computing applications, including...
Minos N. Garofalakis, Kurt P. Brown, Michael J. Fr...
ICTAI
2010
IEEE
15 years 9 days ago
Pocket Data Mining: Towards Collaborative Data Mining in Mobile Computing Environments
Abstract--Pocket Data Mining PDM is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data stre...
Frederic T. Stahl, Mohamed Medhat Gaber, Max Brame...
WPES
2006
ACM
15 years 9 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
EUROSYS
2011
ACM
14 years 6 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...