Back to Results
First PageMeta Content
Document retrieval / WordNet / Web search query / Inverted index / Search engine indexing / Search engine / Semantic similarity / Relevance / Vector space model / Information science / Information retrieval / Query expansion


Embellishing Text Search Queries To Protect User Privacy HweeHwa Pang Xuhua Ding School of Information Systems
Add to Reading List

Document Date: 2010-07-08 09:02:05


Open Document

File Size: 294,56 KB

Share Result on Facebook

City

Similiarity / /

Company

The New York Times / AOL / WordNet / ACM / Intel / /

Country

Singapore / /

/

Event

Product Recall / Product Issues / Reorganization / FDA Phase / /

Facility

Information Systems Singapore Management University / /

IndustryTerm

query processing procedure / dozen search terms / search terms / search engine algorithms / server protocol / query processing / high-specificity search term / text search / similarity-based text search engine / search session / client software / search term / server processing / query evaluation algorithms / genuine search terms / baby-step giant√ step algorithm / genuine search / straightforward evaluation algorithm / user protocol / text search engines / similarity-based retrieval systems / anonymous network / genuine search term ti / text retrieval systems / server computing resources / privacy-preserving text retrieval solution / search engine runs / document retrieval systems / Internet Technology / genuine search term / search engines / Web search engines / query processing function / similarity text search engine / Web log data / Web search / search queries / bucket formation algorithm / cellular network / search query / search application / search engine / high-specificity search terms / /

OperatingSystem

Linux / Ubuntu / /

Organization

Abu Sayyaf / Bucket Organization / VLDB Endowment / Very Large Data Base Endowment / Xiaokui Xiao School / Information Systems Singapore Management University / Nanyang Technological University / PIR PR / Embellishing Text Search Queries To Protect User Privacy HweeHwa Pang Xuhua Ding School / /

Person

Addison Wesley / PIR PR / /

Position

Private Information Retrieval The Private Information Retrieval / head / Private / Private Information Retrieval / /

Product

performance / RAM / Apache / Section 3 / Our solution / /

PublishedMedium

The New York Times / Communications of the ACM / the Walls Street Journal / /

Technology

radiation / query evaluation algorithms / baby-step giant√ step algorithm / search engine algorithms / Linux / server protocol / private key / Internet Technology / search engine / user protocol / secret key / Public Key Encryption / encryption / Cryptography / additively homomorphic encryption / public key / bucket formation algorithm / Second-Generation Onion Router / following protocol / 2 Additively Homomorphic Encryption / straightforward evaluation algorithm / Dense Probabilistic Encryption / /

URL

http /

SocialTag