Sciweavers

3305 search results - page 151 / 661
» Can we Rely on SQL
Sort
View
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
14 years 3 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
APLAS
2008
ACM
14 years 10 days ago
Exception Handlers as Extensible Cases
Abstract. Exceptions are an indispensable part of modern programming languages. They are, however, handled poorly, especially by higherorder languages such as Standard ML and Haske...
Matthias Blume, Umut A. Acar, Wonseok Chae
ICML
2006
IEEE
14 years 11 months ago
Efficient learning of Naive Bayes classifiers under class-conditional classification noise
We address the problem of efficiently learning Naive Bayes classifiers under classconditional classification noise (CCCN). Naive Bayes classifiers rely on the hypothesis that the ...
Christophe Nicolas Magnan, François Denis, ...
PPOPP
2009
ACM
14 years 11 months ago
Software transactional distributed shared memory
We have developed a transaction-based approach to distributed shared memory(DSM) that supports object caching and generates path expression prefetches. A path expression specifies...
Alokika Dash, Brian Demsky
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 5 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek