Sciweavers

4382 search results - page 683 / 877
» Query by Semantic Example
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 7 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
ISSA
2004
15 years 4 months ago
On Privacy And The Web
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
Wesley Brandi
BMCBI
2010
135views more  BMCBI 2010»
15 years 3 months ago
A classification approach for genotyping viral sequences based on multidimensional scaling and linear discriminant analysis
Background: Accurate classification into genotypes is critical in understanding evolution of divergent viruses. Here we report a new approach, MuLDAS, which classifies a query seq...
Ji Woong Kim, Yongju Ahn, Kichan Lee, Sung-Hee Par...
IPM
2008
141views more  IPM 2008»
15 years 3 months ago
Towards a unified approach to document similarity search using manifold-ranking of blocks
Document similarity search (i.e. query by example) aims to retrieve a ranked list of documents similar to a query document in a text corpus or on the Web. Most existing approaches...
Xiaojun Wan, Jianwu Yang, Jianguo Xiao
NAR
2008
118views more  NAR 2008»
15 years 3 months ago
SuperTarget and Matador: resources for exploring drug-target relationships
The molecular basis of drug action is often not well understood. This is partly because the very abundant and diverse information generated in the past decades on drugs is hidden ...
Stefan Günther, Michael Kuhn 0004, Mathias Du...