Sciweavers

2340 search results - page 24 / 468
» Data abstraction and information hiding
Sort
View
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
14 years 2 months ago
Fine-Grain Perturbation for Privacy Preserving Data Publishing
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...
Rhonda Chaytor, Ke Wang, Patricia Brantingham
SIGOPS
2008
116views more  SIGOPS 2008»
13 years 7 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
SC
1995
ACM
13 years 11 months ago
Communication Optimizations for Parallel Computing Using Data Access Information
Given the large communication overheads characteristic of modern parallel machines, optimizations that eliminate, hide or parallelize communication may improve the performance of ...
Martin C. Rinard
JPDC
2011
136views more  JPDC 2011»
12 years 10 months ago
Replicated abstract data types: Building blocks for collaborative applications
ed abstract data types: Building blocks for collaborative applications Hyun-Gul Roha,∗ , Myeongjae Jeonb , Jin-Soo Kimc , Joonwon Leec a Department of Computer Science, KAIST, Da...
Hyun-Gul Roh, Myeongjae Jeon, Jinsoo Kim, Joonwon ...
IH
2005
Springer
14 years 1 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang