Sciweavers

221 search results - page 19 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
ICPP
2006
IEEE
14 years 1 months ago
Adaptively Routing P2P Queries Using Association Analysis
Unstructured peer-to-peer networks have become a very popular method for content distribution in the past few years. By not enforcing strict rules on the network’s topology or c...
Brian D. Connelly, Christopher W. Bowron, Li Xiao,...
WIDM
2003
ACM
14 years 24 days ago
Answering imprecise database queries: a novel approach
A growing number of databases especially those published on the Web are becoming available to external users. Users of these databases are provided simple form-based query interfa...
Ullas Nambiar, Subbarao Kambhampati
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
KES
2006
Springer
13 years 7 months ago
Evolutionary Tuning of Combined Multiple Models
Abstract. In data mining, hybrid intelligent systems present a synergistic combination of multiple approaches to develop the next generation of intelligent systems. Our paper prese...
Gregor Stiglic, Peter Kokol
SIGMOD
2001
ACM
108views Database» more  SIGMOD 2001»
14 years 7 months ago
Improving Index Performance through Prefetching
This paper proposes and evaluates Prefetching B+ -Trees pB+ -Trees, which use prefetching to accelerate two important operations on B+ -Tree indices: searches and range scans. To ...
Shimin Chen, Phillip B. Gibbons, Todd C. Mowry