摘要 |
<p><P>PROBLEM TO BE SOLVED: To cluster distributed data while ensuring safety against an attack composed of clustering executions. <P>SOLUTION: A clustering device A100 includes a database A101, a first conversion part 102, a setting part 103, a third conversion part 104, a polynomial notification part 105, a polynomial calculation part 106, a fifth conversion part 107, a seventh conversion part 108, a conversion value notification part 109, a center setting part 110, and a clustering information storage part 111. A clustering device B150 includes: a database B151, a second conversion part 152, a setting part 153, a fourth conversion part 154, a polynomial notification part 155, a polynomial calculation part 156, a sixth conversion part 157, an eighth conversion part 158, a conversion value notification part 159, a center setting part 160, and a clustering information storage part 161. <P>COPYRIGHT: (C)2011,JPO&INPIT</p> |