Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient
نویسندگان
چکیده
منابع مشابه
Secure set intersection cardinality with application to association rule mining
There has been concern over the apparent conflict between privacy and data mining. There is no inherent conflict, as most types of data mining produce summary results that do not reveal information about individuals. The process of data mining may use private data, leading to the potential for privacy breaches. Secure Multiparty Computation shows that results can be produced without revealing t...
متن کاملconstruction and validation of translation metacognitive strategy questionnaire and its application to translation quality
like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...
Unilateral Jaccard Similarity Coefficient
Similarity measures are essential to solve many pattern recognition problems such as classification, clustering, and retrieval problems. Various similarity measures are categorized in both syntactic and semantic relationships. In this paper we present a novel similarity, Unilateral Jaccard Similarity Coefficient (uJaccard), which doesn’t only take into consideration the space among two points b...
متن کاملMultiset Theories of Cardinality-based Feature Diagrams
Software product line engineering is a very common method for designingcomplex software systems. Feature modeling is the most common approach tospecify product lines. The main part of a feature model is a special tree offeatures called a feature diagram. Cardinality-based feature diagrams providethe most expressive tool among the current feature diagram languages. Themost co...
متن کاملExclusion-Intersection Encryption and Its Application to Searchable Encryption⋆
Identity (or identifier) based encryption has shown to be a useful cryptographic schema enabling secure yet flexible role-based access control. In this paper, we propose a new notion named as exclusionintersection encryption: the sender can specify the targeted groups that are legitimated and interested in reading the documents in the encryption algorithm; there exists a trusted key generation ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2016
ISSN: 1545-5971
DOI: 10.1109/tdsc.2015.2415482