Sciweavers

96 search results - page 12 / 20
» Revealing Additional Information in Two-Party Computations
Sort
View
113
Voted
KDD
2004
ACM
182views Data Mining» more  KDD 2004»
16 years 2 months ago
Rotation invariant distance measures for trajectories
For the discovery of similar patterns in 1D time-series, it is very typical to perform a normalization of the data (for example a transformation so that the data follow a zero mea...
Michail Vlachos, Dimitrios Gunopulos, Gautam Das
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
15 years 8 months ago
Temporal Analysis of Semantic Graphs Using ASALSAN
ASALSAN is a new algorithm for computing three-way DEDICOM, which is a linear algebra model for analyzing intrinsically asymmetric relationships, such as trade among nations or th...
Brett W. Bader, Richard A. Harshman, Tamara G. Kol...
127
Voted
PERCOM
2009
ACM
15 years 8 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
EUROCRYPT
1999
Springer
15 years 6 months ago
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes
Abstract. We present the first efficient statistical zero-knowledge protocols to prove statements such as: – A committed number is a prime. – A committed (or revealed) number ...
Jan Camenisch, Markus Michels
WSC
2008
15 years 4 months ago
How much is a health insurer willing to pay for Colorectal Cancer screening tests?
Colorectal Cancer (CRC) screening tests have proven to be cost-effective in preventing cancer incidence. Yet, as recent studies have shown, CRC screening tests are noticeably unde...
Reza Yaesoubi, Stephen D. Roberts