Slide 1Cryptographic methods for privacy aware computing: applications Slide 2 Outline Review: three basic methods Two applications Distributed decision tree with…
Cryptographic methods for privacy aware computing: applications Outline Review: three basic methods Two applications Distributed decision tree with horizontally partitioned…
ReDrive: Result-Driven Database Exploration through Recommendations ReDrive: Result-Driven Database Exploration through Recommendations Marina Drosou, Evaggelia Pitoura Computer…