Sciweavers

8972 search results - page 69 / 1795
» Private Information Retrieval
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 5 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
JLP
2007
98views more  JLP 2007»
14 years 11 months ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
ANOR
2002
47views more  ANOR 2002»
14 years 11 months ago
Nonparametric Adverse Selection Problems
This article is devoted to adverse selection problems in which individual private information is a whole utility function and cannot be reduced to some finite-dimensional parameter...
Guillaume Carlier
SIGIR
1995
ACM
15 years 2 months ago
Probability Kinematics in Information Retrieval
We analyse the kinematics of probabilistic term weights at retrieval time for di erent Information Retrieval models. We present four models based on di erent notions of probabilis...
Fabio Crestani, C. J. van Rijsbergen
SIGIR
2010
ACM
14 years 5 months ago
PRES: a score metric for evaluating recall-oriented information retrieval applications
Information retrieval (IR) evaluation scores are generally designed to measure the effectiveness with which relevant documents are identified and retrieved. Many scores have been ...
Walid Magdy, Gareth J. F. Jones