Sciweavers

6650 search results - page 1296 / 1330
» models 2009
Sort
View
EUROSSC
2009
Springer
15 years 7 months ago
Semantic Rules for Context-Aware Geographical Information Retrieval
Geographical information retrieval (GIR) can benefit from context information to adapt the results to a user’s current situation and personal preferences. In this respect, seman...
Carsten Keßler, Martin Raubal, Christoph Wos...
116
Voted
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 7 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
15 years 7 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
78
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Functionally Private Approximations of Negligibly-Biased Estimators
ABSTRACT. We study functionally private approximations. An approximation function g is functionally private with respect to f if, for any input x, g(x) reveals no more information ...
André Madeira, S. Muthukrishnan
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
15 years 7 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ...
Marek Lipczak, Evangelos E. Milios
« Prev « First page 1296 / 1330 Last » Next »