Results 91 to 100 of about 79,561 (230)

Questionary Research to Learn State of Affairs of Technological Support CRM [PDF]

open access: yes
Evaluation exercise was made on the basis primary research in which service organizations was spoken. They were answered for questions interrelated to customer relationship management (CRM).CRM, hypothesis, exploited software, cooperative part CRM ...
Suchánek, Petr, Vaněk, Jindřich
core   +1 more source

Secure Outsourced Data Analytics

open access: yes, 2021
The goal of this document is to summarize my research activities since my recruitment as a Maître de Conférences in 2016. Most of my research in this period has been dedicated to addressing the data security concerns that occur when outsourcing some data to the cloud and then performing some computations (such as evaluating a query or a machine ...
openaire   +1 more source

K-Means clustering outsourcing scheme based on sparse matrix transformation and bounded random perturbation

open access: yesTongxin xuebao
To address the problem that existing secure outsourcing schemes for K-Means clustering incur high computational and communication overhead, making them difficult to satisfy the efficiency requirements of practical applications, a privacy-preserving K ...
Zhao Wei   +5 more
doaj  

Secured Outsourced Linear Algebra

open access: yes, 2013
We propose an interactive algorithmic scheme for outsourcing matrix computations on untrusted global computing infrastructures such as clouds or volunteer peer-to-peer platforms. In this scheme, the client outsources part of the computation with guaranties on both the inputs' secrecy and output's integrity.
Kumar, Amrit   +2 more
openaire   +1 more source

SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition

open access: yesAustralasian Conference on Information Security and Privacy, 2020
Jinrong Chen   +3 more
semanticscholar   +1 more source

Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations

open access: yesIEEE Transactions on Big Data, 2018
Sergio A. Salinas Monroy   +4 more
semanticscholar   +1 more source

KmerCrypt: private k-mer search with homomorphic encryption. [PDF]

open access: yesBrief Bioinform
Provatas K   +2 more
europepmc   +1 more source

Challenges of implementing outsourcing of primary health services from the perspective of stakeholders. [PDF]

open access: yesBMC Prim Care
Ebrahimipour H   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy