Sciweavers

344 search results - page 6 / 69
» Adaptive indexing for relational keys
Sort
View
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 3 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
INTELLCOMM
2004
Springer
14 years 3 months ago
About the Heterogeneity of Web Prefetching Performance Key Metrics
Web prefetching techniques have pointed to be especially important to reduce web latencies and, consequently, an important set of works can be found in the open literature. But, in...
Josep Domènech, Julio Sahuquillo, Jos&eacut...
MIR
2005
ACM
128views Multimedia» more  MIR 2005»
14 years 3 months ago
Content-based image retrieval: approaches and trends of the new age
The last decade has witnessed great interest in research on content-based image retrieval. This has paved the way for a large number of new techniques and systems, and a growing i...
Ritendra Datta, Jia Li, James Ze Wang
ICDE
2009
IEEE
198views Database» more  ICDE 2009»
14 years 11 months ago
Double Index NEsted-Loop Reactive Join for Result Rate Optimization
Adaptive join algorithms have recently attracted a lot of attention in emerging applications where data is provided by autonomous data sources through heterogeneous network enviro...
Mihaela A. Bornea, Vasilis Vassalos, Yannis Kotidi...
OPODIS
2010
13 years 7 months ago
An Adaptive Technique for Constructing Robust and High-Throughput Shared Objects
Abstract. Shared counters are the key to solving a variety of coordination problems on multiprocessor machines, such as barrier synchronization and index distribution. It is desire...
Danny Hendler, Shay Kutten, Erez Michalak