Sciweavers

71 search results - page 8 / 15
» Data protection in outsourcing scenarios: issues and directi...
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 11 months ago
Resource Allocation for Downlink Cellular OFDMA Systems: Part I - Optimal Allocation
In this pair of papers (Part I and Part II in this issue), we investigate the issue of power control and subcarrier assignment in a sectorized two-cell downlink OFDMA system impair...
Nassar Ksairi, Pascal Bianchi, Philippe Ciblat, Wa...
TSP
2010
14 years 6 months ago
Resource allocation for downlink cellular OFDMA systems: part I: optimal allocation
In this pair of papers (Part I and Part II in this issue), we investigate the issue of power control and subcarrier assignment in a sectorized two-cell downlink OFDMA system impai...
Nassar Ksairi, Pascal Bianchi, Philippe Ciblat, Wa...
IPPS
2008
IEEE
15 years 6 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
ICIP
2010
IEEE
14 years 9 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
15 years 5 months ago
Privacy Preserving Market Basket Data Analysis
Randomized Response techniques have been empirically investigated in privacy preserving association rule mining. However, previous research on privacy preserving market basket data...
Ling Guo, Songtao Guo, Xintao Wu