Sciweavers

24188 search results - page 232 / 4838
» Computing on Encrypted Data
Sort
View
92
Voted
IPPS
2000
IEEE
15 years 8 months ago
Parallel Data Mining of Bayesian Networks from Telecommunications Network Data
Roy Sterritt, Kenneth Adamson, Mary Shapcott, Edwi...
102
Voted
CONEXT
2010
ACM
15 years 1 months ago
Personal data vaults: a locus of control for personal data streams
Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, ...
148
Voted
BIODATAMINING
2008
120views more  BIODATAMINING 2008»
15 years 3 months ago
Filling the gap between biology and computer science
This editorial introduces BioData Mining, a new journal which publishes research articles related to advances in computational methods and techniques for the extraction of useful ...
Jesús S. Aguilar-Ruiz, Jason H. Moore, Mary...
120
Voted
CIE
2005
Springer
15 years 9 months ago
Computability in Computational Geometry
We promote the concept of object directed computability in computational geometry in order to faithfully generalise the wellestablished theory of computability for real numbers and...
Abbas Edalat, Ali Asghar Khanban, André Lie...
86
Voted
PERCOM
2004
ACM
16 years 3 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva