Keyphrases
Adaptive Indexing
8%
Amazon.com
5%
Analytical Systems
5%
Approximation Guarantee
13%
Arbitrary Length
8%
Assurance Schemes
17%
Attack Model
5%
Authenticated Data Structures
17%
Authentication Scheme
8%
Bigraphs
10%
Blinking
13%
Boomers
26%
Centralized Environment
8%
Chemical Databases
5%
Chosen-plaintext Attack
6%
CiteSeer
6%
Code-based
8%
Color Combination
15%
Color number
5%
Coloring Technique
5%
Communication Cost
8%
Communication Overhead
8%
Community Search
26%
Compiler Optimization
5%
Confidentiality
5%
Connected Component
21%
Construction Algorithm
11%
Conventional Scheme
8%
Core Community
26%
Core Graph
5%
Crossing Edges
5%
Data Graph
23%
Data Outsourcing
30%
Data Query
5%
Data Summarization
26%
Data-oblivious
6%
Decryption Time
6%
Design Index
8%
Design Protocol
8%
Digital Signature
8%
Digital Text
8%
Distributed Environment
14%
Distributed Graph Coloring
5%
Edge Map
8%
Efficient Encryption
5%
Encrypted Index
6%
Encryption
6%
Encryption Scheme
5%
Existing Techniques
6%
For Indexing
26%
Frequent Subgraphs
6%
Gene Ontology
13%
Generic Ontologies
26%
Granules
8%
Graph Algorithms
15%
Graph Analytics
26%
Graph Attribute
5%
Graph Coloring
15%
Graph Coloring Algorithm
5%
Graph Database
35%
Graph Parallelization
10%
Graph Pattern Queries
6%
Graph Query
92%
Graph Structure
30%
Graph Topology
5%
Graph Visualization
26%
Greedy Algorithm
13%
Greedy Coloring Algorithm
5%
Hardware Transactional Memory
26%
High Complexity
6%
Homomorphic
26%
Human-computer Interaction
10%
Index Construction
15%
Index-based
26%
Indexing Scheme
8%
Inexact Algorithm
6%
Information Networks
5%
Integrity Assurance
17%
International Classification of Diseases
13%
K-core
26%
K-nearest Neighbor (K-NN)
8%
Keyword Search
26%
Known-plaintext Attack
6%
Large Graphs
100%
Large-scale Networks
84%
Latency
8%
Linear Algebra
26%
Local Color
5%
Local Exploration
10%
Locality Principle
5%
Location Disclosure
26%
Location Tracking
8%
Location-based Services
17%
Logic Unit
6%
Malicious Parties
8%
Matrix-vector
5%
Maximum Matching
5%
Medical Subject Headings (MeSH)
13%
Message Authentication Code
26%
Mobile Devices
26%
Mouse Click
11%
Multi-core Servers
5%
Multicore
5%
Nearest Neighbor Query
26%
Non-expert Users
8%
Novel Index
6%
Online Adaptive
8%
Online Data
5%
Ontological Basis
26%
Ontological Framework
26%
Ontology Structure
13%
Optimistic Approach
5%
Optimization Algorithm
8%
Overflow
6%
Overhead Time
8%
Parallelization
26%
Parameter Setting
6%
Partially Homomorphic Encryption
6%
Performance Evaluation
6%
Plaintext
8%
Polynomial Complexity
5%
Popular
11%
Potential Gains
8%
Prefix
8%
Privacy Analysis
11%
Privacy-preserving
78%
Privacy-preserving Query
6%
Privacy-preserving Techniques
10%
Private Set Intersection
5%
Processing Paradigm
8%
Provider Services
5%
Public-private
26%
Quality of Service
10%
Query Algorithm
26%
Query Answering
23%
Query Authentication
26%
Query Auto-completion
52%
Query Construction
8%
Query Cost
8%
Query Formulation
41%
Query Graph
8%
Query Interface
8%
Query Processing
17%
Query Semantics
6%
Query Services
38%
Query Structure
6%
Query Suggestion
35%
Query-based
8%
Ranking Queries
11%
Reachability Index
6%
Reachability Query
26%
Real Users
6%
Real-world Application
24%
Removal Strategies
5%
Research Communication
5%
Result Integrity
17%
Scalar Product
18%
Security Analysis
8%
Security Assurance
10%
Semantic Query
6%
Service Attributes
5%
Service Provider
49%
Shapelet Discovery
26%
Shapelets
26%
Signature Authentication
8%
Simulation Algorithm
6%
Smartphone-based
8%
Software Artifacts
5%
Spatial Analytics
8%
Spatial Data
8%
Spatial-temporal
8%
Spatio-temporal Data
8%
Spatiotemporal
26%
State-of-the-art Techniques
15%
Strong Simulation
26%
Structural Information
6%
Structural Search
5%
Subgraph Query
6%
Subgraph Query Processing
8%
Subsequence
15%
Summary Graph
9%
System Response Time
8%
Third-party Providers
18%
Time Series Classification
26%
Transactional Memory
5%
Twitter
6%
User Location
8%
User Preference
6%
User Privacy
8%
User-focused
26%
Verifiable Messages
8%
Verification Cost
8%
Verification Object
17%
Verification Time
8%
Verifier
17%
Vertex-cut
26%
Visual Graph
8%
Visual Query
35%
Visual Querying
8%
Weighted Graph
26%
Computer Science
Analytical System
5%
Analytics System
5%
And-States
5%
Approximation (Algorithm)
35%
Approximation Ratio
6%
Authentication
26%
authentication scheme
8%
Bloom Filter
26%
Centralized Environment
8%
Classification Models
26%
Communication Network
6%
Communication Overhead
8%
Compiler Optimization
6%
Computer Hardware
8%
Connected Component
26%
Construction Algorithm
13%
Data Analytics
8%
Data Privacy
5%
Data Source
9%
Data Structure
8%
Decryption
6%
Degree Distribution
5%
Digital Signature
8%
Distributed Data Structure
8%
Distributed Environment
14%
Efficient Algorithm
19%
Expansion Phase
8%
Experimental Result
22%
Facebook
5%
Focus Attention
5%
Frequent Subgraph
26%
Generic Subroutine
6%
Good Performance
8%
Graph Algorithm
13%
Graph Analytics
26%
Graph Coloring
26%
Graph Database
39%
Graph Partition
6%
Greedy Algorithm
8%
Group Community
8%
Hardware Transactional Memory
26%
Hidden Information
5%
Homomorphic Encryption
13%
Human Computer Interaction
26%
Hybrid Approach
5%
Index Construction
19%
Instagram
5%
Keyword Search
26%
Location-Based Service
17%
Maximum Matching
6%
Memory Transaction
5%
Message Authentication Code
26%
Mobile Device
26%
Multicore
10%
near neighbor query
26%
Online Social Network
5%
Ontology
52%
Operations Research
6%
Parallelization
26%
Party Service Provider
24%
Performance Evaluation
26%
Plaintext Attack
19%
Polynomial Time
6%
Potential Benefit
13%
Privacy Concern
5%
Privacy Preserving
78%
Private Attribute
5%
Private Network
26%
Processing Paradigm
13%
Quality of Service
8%
Query Formulation Process
13%
Query Processing
26%
Ranking Function
13%
Refinement Phase
8%
Research Result
13%
Scalar Product
17%
Security Analysis
8%
Sensitive Informations
13%
Service Provider
61%
Shared Memory
5%
Sliding Window
26%
Small Proportion
5%
Social Network
7%
Spanning Tree
8%
Spatiotemporal Data
8%
Speed-up
26%
Subgraphs
95%
Subject Heading
8%
Synthetic Datasets
5%
System Analysis
6%
System Response Time
13%
Systems and Application
8%
Time Complexity
6%
Tracking (Position)
8%
Transactional Memory
5%
Usability Perspective
5%
User Preference
26%
User Privacy
8%
Visual Environment
13%
Weighted Graph
26%
World Application
15%