Sciweavers

24188 search results - page 253 / 4838
» Computing on Encrypted Data
Sort
View
151
Voted
BMCBI
2002
134views more  BMCBI 2002»
15 years 3 months ago
CoreGenes: A computational tool for identifying and cataloging "core" genes in a set of small genomes
Background: Improvements in DNA sequencing technology and methodology have led to the rapid expansion of databases comprising DNA sequence, gene and genome data. Lower operational...
Nikhat Zafar, Raja Mazumder, Donald Seto
133
Voted
ICWE
2010
Springer
15 years 5 months ago
Designing Service Marts for Engineering Search Computing Applications
: The use of patterns in data management is not new: in data warehousing, data marts are simple conceptual schemas with exactly one core entity, describing facts, surrounded by mul...
Alessandro Campi, Stefano Ceri, Andrea Maesani, St...
106
Voted
ICPR
2002
IEEE
15 years 8 months ago
High-Resolution Reconstruction of Sparse Data from Dense Low-Resolution Spatio-Temporal Data
Abstract—A novel approach for reconstruction of sparse highresolution data from lower-resolution dense spatio-temporal data is introduced. The basic idea is to compute the dense ...
Qing Yang, Bahram Parvin
149
Voted
EUROCRYPT
2004
Springer
15 years 9 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
104
Voted
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
16 years 26 days ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han