-
3
-
-
0032201716
-
An optimal algorithm for approximate nearest neighbor searching fixed dimensions
-
Sunil Arya and David M. Mount and Nathan S. Netanyahu and Ruth Silverman and Angela Y. Wu. An Optimal Algorithm for Approximate Nearest Neighbor Searching Fixed Dimensions. Journal of the ACM, 45(6):891-923, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 891-923
-
-
Arya, S.1
Mount, D.M.2
Netanyahu, N.S.3
Silverman, R.4
Wu, A.Y.5
-
7
-
-
84892362949
-
Mining multiple private databases using a privacy preserving KNN classifier
-
Subramanyam Chitti and Li Xiong and Ling Liu. Mining Multiple Private Databases using a Privacy Preserving kNN Classifier. Technical report, Georgia Tech, 2004.
-
(2004)
Technical Report, Georgia Tech
-
-
Chitti, S.1
Xiong, L.2
Liu, L.3
-
13
-
-
26944461753
-
Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data
-
Levent Ertöz and Michael Steinbach and Vipin Kumar. Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data. In Proceedings of the SIAM International Conference on Data Mining, 2003.
-
(2003)
Proceedings of the SIAM International Conference on Data Mining
-
-
Ertöz, L.1
Steinbach, M.2
Kumar, V.3
-
16
-
-
4444266989
-
Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
Jinliang Fan and Jun Xu and Mostafa H. Ammar and Sue B. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. The International Journal of Computer and Telecommunications Networking, 46(2):253-272, 2004.
-
(2004)
The International Journal of Computer and Telecommunications Networking
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.H.3
Moon, S.B.4
-
26
-
-
0015680655
-
Clustering using a similarity measure based on shared nearest neighbors
-
R. A. Jarvis and E. A. Patrick. Clustering Using a Similarity Measure Based on Shared Nearest Neighbors. IEEE Transactions on Computers, C22(11):1025-1034, 1973.
-
(1973)
IEEE Transactions on Computers
, vol.C22
, Issue.11
, pp. 1025-1034
-
-
Jarvis, R.A.1
Patrick, E.A.2
-
31
-
-
84892344961
-
Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation
-
Eike Kiltz and Ivan Damgaard and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. In Proceedings of the third Theory of Cryptography Conference, 2006.
-
(2006)
Proceedings of the Third Theory of Cryptography Conference
-
-
Kiltz, E.1
Damgaard, I.2
Fitzi, M.3
Nielsen, J.B.4
Toft, T.5
-
43
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of Eurocrypt, 1999.
-
(1999)
Proceedings of Eurocrypt
-
-
Paillier, P.1
-
45
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Pierangela Samarati and Latanya Sweeney. Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression. Technical report, SRI International, 1998.
-
(1998)
Technical Report, SRI International
-
-
Samarati, P.1
Sweeney, L.2
|