Login / Signup

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.

Yuto NakanoShinsaku KiyomotoYutaka MiyakeKouichi Sakurai
Published in: IEICE Trans. Inf. Syst. (2014)
Keyphrases
  • efficient implementation
  • access patterns
  • active set
  • protection schemes
  • machine learning
  • web users
  • information retrieval
  • data integration
  • web usage mining
  • web logs