Results 21 to 30 of about 3,672,861 (190)
Using secret sharing for searching in encrypted data [PDF]
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir +3 more
core +11 more sources
Macromolecular Big Data provide numerous challenges and a number of initiatives that are starting to overcome these issues are discussed.
Marek Grabowski, Wladek Minor
openaire +3 more sources
SCMDOT: Spatial Clustering with Multiple Density-Ordered Trees
With the rapid explosion of information based on location, spatial clustering plays an increasingly significant role in this day and age as an important technique in geographical data analysis.
Xiaozhu Wu, Hong Jiang, Chongcheng Chen
doaj +1 more source
Low-Light Image Enhancement Based on Maximal Diffusion Values
A vast amount of pictures are taken every day by using cameras mounted on various mobile devices. Even though the clarity of such acquired images has been significantly improved due to the advance of the image sensor technology, the visual quality is ...
Wonjun Kim +3 more
doaj +1 more source
STUDY ON BUILDING EXTRACTION FROM HIGH-RESOLUTION IMAGES USING MBI [PDF]
Building extraction from high resolution remote sensing images is a hot research topic in the field of photogrammetry and remote sensing. However, the diversity and complexity of buildings make building extraction methods still face challenges in terms ...
Z. Ding +3 more
doaj +1 more source
Wellcome Trust Policy on Data Management and Sharing [PDF]
The Wellcome Trust's policy statement on data management and sharing, which was originally published in January 2007 and revised in August ...
David Carr
core +2 more sources
Controlled Data Sharing for Collaborative Predictive Blacklisting [PDF]
Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges.
B Applebaum +9 more
core +2 more sources
A Locating Method for Multi-Purposes HTs Based on the Boundary Network
Recently, there are various methods for detecting the hardware trojans (HTs) in the integrated circuits (ICs). The circuit's logic representations of different types, structures, and functional characteristics should be different.
Chen Dong +5 more
doaj +1 more source
Prevalence and Patterns of Microarray Data Sharing [PDF]
Sharing research data is a cornerstone of science. Although many tools and policies exist to encourage data sharing, the prevalence with which datasets are shared is not well understood. We report our preliminary results on patterns of sharing microarray
Heather A. Piwowar, Wendy W. Chapman
core +2 more sources
SPATIAL AND TEMPORAL VARIATION OF LAND SURFACE TEMPERATURE IN FUJIAN PROVINCE FROM 2001 TO 2015 [PDF]
Land surface temperature (LST) is an essential parameter in the physics of land surface processes. The spatiotemporal variations of LST on the Fujian province were studied using AQUA Moderate Resolution Imaging Spectroradiometer LST data. Considering the
Y. Li, X. Wang, Z. Ding
doaj +1 more source

