Sciweavers

3210 search results - page 8 / 642
» Secure Similarity Search
Sort
View
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
15 years 6 months ago
Fast similarity search in peer-to-peer networks
Abstract—Peer-to-peer (P2P) systems show numerous advantages over centralized systems, such as load balancing, scalability, and fault tolerance, and they require certain function...
Thomas Bocek, Ela Hunt, David Hausheer, Burkhard S...
BMCBI
2007
124views more  BMCBI 2007»
14 years 11 months ago
Protein structural similarity search by Ramachandran codes
Background: Protein structural data has increased exponentially, such that fast and accurate tools are necessary to access structure similarity search. To improve the search speed...
Wei-Cheng Lo, Po-Jung Huang, Chih-Hung Chang, Ping...
ISI
2005
Springer
15 years 5 months ago
Template Based Semantic Similarity for Security Applications
Boanerges Aleman-Meza, Christian Halaschek-Wiener,...
DEXAW
2002
IEEE
84views Database» more  DEXAW 2002»
15 years 4 months ago
Privacy of Trust in Similarity Estimation through Secure Computations
Javier Carbo Rubiera, José M. Molina L&oacu...
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
15 years 1 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...