• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.

Yuto NakanoShinsaku KiyomotoYutaka MiyakeKouichi Sakurai
Published in: IEICE Trans. Inf. Syst. (2014)
Keyphrases
  • efficient implementation
  • access patterns
  • active set
  • protection schemes
  • machine learning
  • web users
  • information retrieval
  • data integration
  • web usage mining
  • web logs