-
2
-
-
0033075316
-
Combining fuzzy information from multiple systems
-
(Special Issue for Selected Papers from the 1996 ACM Symp. Principles of Database Systems)
-
R. Fagin, "Combining Fuzzy Information from Multiple Systems, " J. Computer and System Sciences, (Special issue for selected papers from the 1996 ACM Symp. Principles of Database Systems), pp. 83-99, 1999.
-
(1999)
J. Computer and System Sciences
, pp. 83-99
-
-
Fagin, R.1
-
5
-
-
51849103902
-
-
M. Shaneck, Y. Kim, and V. Kumar, "Privacy Preserving Nearest Neighbor Search, " Proc. ICDM Workshops, pp. 541-545, 2006.
-
(2006)
Privacy Preserving Nearest Neighbor Search, Proc. ICDM Workshops
, pp. 541-545
-
-
Shaneck, M.1
Kim, Y.2
Kumar, V.3
-
6
-
-
84926662675
-
Nearest neighbor pattern classification
-
Jan
-
T.M. Cover and P. Hart, "Nearest Neighbor Pattern Classification, " IEEE Trans. Information Theory, vol. 13, pp. 21-27, Jan. 1967.
-
(1967)
IEEE Trans. Information Theory
, vol.13
, pp. 21-27
-
-
Cover, T.M.1
Hart, P.2
-
7
-
-
27844564572
-
A new shared nearest neighbor clustering algorithm and its applications
-
Workshop Clustering High Dimensional Data and its Applications
-
L. Ertoz, M. Steinbach, and V. Kumar, "A New Shared Nearest Neighbor Clustering Algorithm and Its Applications, " Proc. Text Mine, First SIAM Int'l Conf. Data Mining (SDM '01), Workshop Clustering High Dimensional Data and Its Applications, 2001.
-
(2001)
Proc. Text Mine, First SIAM Int'l Conf. Data Mining (SDM '01)
-
-
Ertoz, L.1
Steinbach, M.2
Kumar, V.3
-
8
-
-
0015680655
-
Clustering using a similarity measure based on shared nearest neighbors
-
Nov
-
R.A. Jarvis and E.A. Patrick, "Clustering Using a Similarity Measure Based on Shared Nearest Neighbors, " IEEE Trans. Computers, vol. 22, no. 11, pp. 1025-1034, Nov. 1973.
-
(1973)
IEEE Trans. Computers
, vol.22
, Issue.11
, pp. 1025-1034
-
-
Jarvis, R.A.1
Patrick, E.A.2
-
9
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
W. Chen, J.F. Naughton, and P.A. Bernstein, eds
-
M.M. Breunig, H.-P. Kriegel, R.T. Ng, and J. Sander, "LOF: Identifying Density-Based Local Outliers, " Proc. ACM SIGMOD '00, W. Chen, J.F. Naughton, and P.A. Bernstein, eds., pp. 93-104, 2000.
-
(2000)
Proc. ACM SIGMOD '00
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
12
-
-
0036211203
-
Evaluating top-k queries over web-accessible databases
-
Feb./Mar
-
N. Bruno, L. Gravano, and A. Marian, "Evaluating Top-k Queries over Web-Accessible Databases, " Proc. 18th Int'l Conf. Data Eng. (ICDE '02), pp. 369-380, http://ieeexplore.ieee.org/iel5/7807/21451/00994751.pdf, Feb./Mar. 2002.
-
(2002)
Proc. 18th Int'l Conf. Data Eng. (ICDE '02)
, pp. 369-380
-
-
Bruno, N.1
Gravano, L.2
Marian, A.3
-
14
-
-
0003979335
-
-
ch. General Cryptographic Protocols, Cambridge Univ. Press
-
O. Goldreich, The Foundations of Cryptography, vol. 2, ch. General Cryptographic Protocols, Cambridge Univ. Press, http://www.wisdom.weizmann.ac. il/~oded/PSBookFrag/prot.ps, 2004.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
15
-
-
0034819889
-
Optimal aggregation algorithms for middleware
-
May
-
R. Fagin, A. Lotem, and M. Naor, "Optimal Aggregation Algorithms for Middleware, " Proc. 20th ACM SIGACT-SIGMODSIGART Symp. Principles of Database Systems (PODS '01), pp. 102- 113, http://doi.acm.org/10.1145/375551. 375567 May 2001.
-
(2001)
Proc. 20th ACM SIGACT-SIGMODSIGART Symp. Principles of Database Systems (PODS '01)
, pp. 102-113
-
-
Fagin, R.1
Lotem, A.2
Naor, M.3
-
17
-
-
85012120419
-
Supporting top-k join queries in relational databases
-
Sept
-
I.F. Ilyas, W.G. Aref, and A.K. Elmagarmid, "Supporting Top-k Join Queries in Relational Databases, " Proc. 29th Int'l Conf. Very Large Data Bases (VLDB '03), pp. 754-765, http://www.vldb.org/conf/2003/papers/S23P01.pdf, Sept. 2003.
-
(2003)
Proc. 29th Int'l Conf. Very Large Data Bases (VLDB '03)
, pp. 754-765
-
-
Ilyas, I.F.1
Aref, W.G.2
Elmagarmid, A.K.3
-
18
-
-
70350491940
-
Special section on privacy and security
-
Jan, i-48
-
"Special Section on Privacy and Security" SIGKDD Explorations, vol. 4, no. 2, pp. i-48, http://www.acm.org/sigs/sigkdd/explorations/issue4-2/ contents.htm, Jan. 2003.
-
(2003)
SIGKDD Explorations
, vol.4
, Issue.2
-
-
-
19
-
-
84882630942
-
Privacy-preserving data mining
-
first ed. ser., Springer- Verlag
-
J. Vaidya, C. Clifton, and M. Zhu, Privacy-Preserving Data Mining, first ed., ser. Advances in Information Security, vol. 19, Springer- Verlag, http://www.springeronline.com/sgw/cda/frontpage/0118554-40356-72-52496494-000. html, 2005.
-
(2005)
Advances in Information Security
, vol.19
-
-
Vaidya, J.1
Clifton, C.2
Zhu, M.3
-
21
-
-
85084163840
-
Fairplay-a secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay-A Secure Two-Party Computation System, " Proc. 13th USENIX Security Symp., pp. 287-302, 2004.
-
(2004)
Proc. 13th USENIX Security Symp.
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
22
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Nov
-
J. Vaidya and C. Clifton, "Secure Set Intersection Cardinality with Application to Association Rule Mining, " J. Computer Security, vol. 13, no. 4, pp. 593-622, Nov. 2005.
-
(2005)
J. Computer Security
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
23
-
-
1142303699
-
Information sharing across private databases
-
June
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing across Private Databases, " Proc. ACM SIGMOD '03, http://doi.acm.org/10. 1145/872757.872771, June 2003.
-
(2003)
Proc. ACM SIGMOD '03
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
25
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Sept
-
M. Kantarcioǧlu and C. Clifton, "Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data, " IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9, pp. 1026-1037, http://csdl.computer.org/comp/trans/tk/2004/09/k1026abs.htm Sept. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng.
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioǧlu, M.1
Clifton, C.2
-
26
-
-
85012127915
-
Privacy-preserving indexing of documents on the network
-
Sept
-
M. Bawa, R.J. Bayardo Jr, and R. Agrawal, "Privacy-Preserving Indexing of Documents on the Network, " Proc. 29th Int'l Conf. Very Large Data Bases (VLDB '03), pp. 922-933, http://www.vldb.org/conf/2003/papers/S27P03. pdf, Sept. 2003.
-
(2003)
Proc. 29th Int'l Conf. Very Large Data Bases (VLDB '03)
, pp. 922-933
-
-
Bawa, M.1
Bayardo Jr., R.J.2
Agrawal, R.3
-
27
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S.C. Pohlig and M.E. Hellman, "An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance, " IEEE Trans. Information Theory, vol. IT-24, pp. 106-110, 1978.
-
(1978)
IEEE Trans. Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
28
-
-
24944523186
-
On secure scalar product computation for privacy-preserving data mining
-
C. Park and S. Chee, eds., Dec
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, "On Secure Scalar Product Computation for Privacy-Preserving Data Mining, " Proc. Seventh Ann. Int'l Conf. Information Security and Cryptology (ICISC '04), C. Park and S. Chee, eds., vol. 3506, pp. 104-120, Dec. 2004.
-
(2004)
Proc. Seventh Ann. Int'l Conf. Information Security and Cryptology (ICISC '04)
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikssäinen, T.4
-
29
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
Springer-Verlag
-
M. Fischlin, "A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires, " RSA Security 2001 Cryptographer's Track LNCS, vol. 2020, Springer-Verlag, pp. 457-471, 2001.
-
(2001)
RSA Security 2001 Cryptographer's Track LNCS
, vol.2020
, pp. 457-471
-
-
Fischlin, M.1
|