Results 21 to 30 of about 3,672,861 (190)

Using secret sharing for searching in encrypted data [PDF]

open access: yes, 2004
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir   +3 more
core   +11 more sources

Sharing Big Data [PDF]

open access: yesIUCrJ, 2017
Macromolecular Big Data provide numerous challenges and a number of initiatives that are starting to overcome these issues are discussed.
Marek Grabowski, Wladek Minor
openaire   +3 more sources

SCMDOT: Spatial Clustering with Multiple Density-Ordered Trees

open access: yesISPRS International Journal of Geo-Information, 2017
With the rapid explosion of information based on location, spatial clustering plays an increasingly significant role in this day and age as an important technique in geographical data analysis.
Xiaozhu Wu, Hong Jiang, Chongcheng Chen
doaj   +1 more source

Low-Light Image Enhancement Based on Maximal Diffusion Values

open access: yesIEEE Access, 2019
A vast amount of pictures are taken every day by using cameras mounted on various mobile devices. Even though the clarity of such acquired images has been significantly improved due to the advance of the image sensor technology, the visual quality is ...
Wonjun Kim   +3 more
doaj   +1 more source

STUDY ON BUILDING EXTRACTION FROM HIGH-RESOLUTION IMAGES USING MBI [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2018
Building extraction from high resolution remote sensing images is a hot research topic in the field of photogrammetry and remote sensing. However, the diversity and complexity of buildings make building extraction methods still face challenges in terms ...
Z. Ding   +3 more
doaj   +1 more source

Wellcome Trust Policy on Data Management and Sharing [PDF]

open access: yes, 2011
The Wellcome Trust's policy statement on data management and sharing, which was originally published in January 2007 and revised in August ...
David Carr
core   +2 more sources

Controlled Data Sharing for Collaborative Predictive Blacklisting [PDF]

open access: yes, 2015
Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges.
B Applebaum   +9 more
core   +2 more sources

A Locating Method for Multi-Purposes HTs Based on the Boundary Network

open access: yesIEEE Access, 2019
Recently, there are various methods for detecting the hardware trojans (HTs) in the integrated circuits (ICs). The circuit's logic representations of different types, structures, and functional characteristics should be different.
Chen Dong   +5 more
doaj   +1 more source

Prevalence and Patterns of Microarray Data Sharing [PDF]

open access: yes, 2008
Sharing research data is a cornerstone of science. Although many tools and policies exist to encourage data sharing, the prevalence with which datasets are shared is not well understood. We report our preliminary results on patterns of sharing microarray
Heather A. Piwowar, Wendy W. Chapman
core   +2 more sources

SPATIAL AND TEMPORAL VARIATION OF LAND SURFACE TEMPERATURE IN FUJIAN PROVINCE FROM 2001 TO 2015 [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2018
Land surface temperature (LST) is an essential parameter in the physics of land surface processes. The spatiotemporal variations of LST on the Fujian province were studied using AQUA Moderate Resolution Imaging Spectroradiometer LST data. Considering the
Y. Li, X. Wang, Z. Ding
doaj   +1 more source

Home - About - Disclaimer - Privacy