Sciweavers

1906 search results - page 256 / 382
» Data Privacy
Sort
View
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
15 years 9 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
15 years 10 months ago
On K-Means Cluster Preservation Using Quantization Schemes
This work examines under what conditions compression methodologies can retain the outcome of clustering operations. We focus on the popular k-Means clustering algorithm and we dem...
Deepak S. Turaga, Michail Vlachos, Olivier Versche...
ESEM
2007
ACM
15 years 7 months ago
Automated Information Extraction from Empirical Software Engineering Literature: Is that possible?
The number of scientific publications is constantly increasing, and the results published on Empirical Software Engineering are growing even faster. Some software engineering publ...
Daniela Cruzes, Victor R. Basili, Forrest Shull, M...
DGO
2004
109views Education» more  DGO 2004»
15 years 5 months ago
Citizens Preferences Towards One-Stop Government
The poster presents the major results of a survey conducted in several German cities to asses preferences citizens have towards aspects of One-Stop Government. One Stop Government...
Alexander Schellong, Dieter Mans
CSSE
2006
IEEE
15 years 4 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...