Sciweavers

1527 search results - page 243 / 306
» Hidden word statistics
Sort
View
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 8 days ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002
EDBT
2009
ACM
222views Database» more  EDBT 2009»
15 years 6 months ago
Data clouds: summarizing keyword search results over structured data
Keyword searches are attractive because they facilitate users searching structured databases. On the other hand, tag clouds are popular for navigation and visualization purposes o...
Georgia Koutrika, Zahra Mohammadi Zadeh, Hector Ga...
ICASSP
2009
IEEE
15 years 6 months ago
Cross-lingual speech recognition under runtime resource constraints
This paper proposes and compares four cross-lingual and bilingual automatic speech recognition techniques under the constraints of limited memory size and CPU speed. The first thr...
Dong Yu, Li Deng, Peng Liu, Jian Wu, Yifan Gong, A...
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
15 years 6 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
JCDL
2006
ACM
151views Education» more  JCDL 2006»
15 years 5 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber