Sciweavers

2340 search results - page 44 / 468
» Data abstraction and information hiding
Sort
View
MDA
1999
Springer
179views Communications» more  MDA 1999»
14 years 2 months ago
Cache Coherency in Location-Dependent Information Services for Mobile Environment
Abstract. Caching frequently accessed data at the client is an attractive technique for improving access time. In a mobile computing environment, client location becomes a piece of...
Jianliang Xu, Xueyan Tang, Dik Lun Lee, Qinglong H...
PAKDD
1999
ACM
87views Data Mining» more  PAKDD 1999»
14 years 2 months ago
On Information-Theoretic Measures of Attribute Importance
Abstract. An attribute is deemed important in data mining if it partitions the database such that previously unknown regularities are observable. Many information-theoretic measure...
Yiyu Yao, S. K. Michael Wong, Cory J. Butz
CCGRID
2008
IEEE
14 years 4 months ago
Optimized Distributed Data Sharing Substrate in Multi-core Commodity Clusters: A Comprehensive Study with Applications
Distributed applications tend to have a complex design due to issues such as concurrency, synchronization and communication. Researchers in the past have proposed abstractions to ...
Karthikeyan Vaidyanathan, Ping Lai, Sundeep Narrav...
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 8 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
FC
2009
Springer
150views Cryptology» more  FC 2009»
14 years 4 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung