Sciweavers

242 search results - page 15 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
GCA
2009
14 years 7 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
WWW
2009
ACM
15 years 10 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
RIAO
2007
14 years 11 months ago
Multi-Modal Music Information Retrieval - Visualisation and Evaluation of Clusterings by Both Audio and Lyrics
Navigation in and access to the contents of digital audio archives have become increasingly important topics in Information Retrieval. Both private and commercial music collection...
Robert Neumayer, Andreas Rauber
81
Voted
SAC
2009
ACM
15 years 4 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
CSMR
2003
IEEE
15 years 2 months ago
Software Services and Software Maintenance
Software services are being promoted as the next big step forward in software engineering.. Inevitably, both service vendor and service client programs will require maintenance. W...
Keith H. Bennett, Jie Xu