Login / Signup
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
Yuto Nakano
Shinsaku Kiyomoto
Yutaka Miyake
Kouichi Sakurai
Published in:
IEICE Trans. Inf. Syst. (2014)
Keyphrases
</>
efficient implementation
access patterns
active set
protection schemes
machine learning
web users
information retrieval
data integration
web usage mining
web logs