A computer-based method for securely sharing confidential information, comprising:(a) receiving term vectors corresponding to ones of a plurality of confidential terms included in a plurality of confidential documents;(b) mapping each of the received term vectors into a vector space;(c) mapping non-confidential documents into the vector space to generate a document vector corresponding to each non-confidential document, wherein the generation of each document vector is based on a subset of the received term vectors; and(d) identifying at least one of the non-confidential documents in response to a query mapped into the vector space.
A vacation is what you take when you can no longer take what you've been taking.
" Cheap Hotels | Sydney Hotels "- Nataly L Adam, Sydney, 01.12.2010 |