• No results found

A fast secure dot product protocol with application to privacy preserving association rule mining

N/A
N/A
Protected

Academic year: 2019

Share "A fast secure dot product protocol with application to privacy preserving association rule mining"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 2: Running Time in Non-Parallel and Parallel Modes with Various Vector Density
Fig. 3: Bandwidth Consumption

References

Related documents

Table 2: United Nations Security Council Presidential Statements Concerning Syria Civil War. Year Draft Text Number UNSC Presidential Statements Concerning Syria

Here, we surveyed the role of NHEJ or SSA factors in joining of double-strand breaks (DSBs) with no complementary DNA ends that rely primarily on MMEJ repair.. We found that

function of buffer content, W(y) , is shown in Figure 5 and the probability. of no loss is 94% in

While advanced battery technology is growing very fast to support the rapidly-evolving technologies such as Smart Grid and Electric Vehicles (EV) with higher power and energy

we compared observed and expected frequencies of AG ceding intron-exon junction likely contributes to selec- tion against exonic AG in the vicinity of splicing site in pairs on

Given that the anticancer effects and molecular mechanisms of digoxin in retinoblastoma cancer cells are unknown, the present study aimed at evaluating the

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2007, Article ID 35946, 14 pages doi 10 1155/2007/35946 Research Article A Markovian

The other advantage of PDT is the reduction in cost. This avoids the use of valuable OT time 4,5, which is necessary for a surgical tracheostomy. The reduction in waiting time for