Sciweavers

795 search results - page 115 / 159
» Magnetophotonic Materials and Their Applications
Sort
View
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 4 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
VLDB
2004
ACM
180views Database» more  VLDB 2004»
14 years 4 months ago
Bloom Histogram: Path Selectivity Estimation for XML Data with Updates
Cost-based XML query optimization calls for accurate estimation of the selectivity of path expressions. Some other interactive and internet applications can also benefit from suc...
Wei Wang 0011, Haifeng Jiang, Hongjun Lu, Jeffrey ...
SIGECOM
2003
ACM
122views ECommerce» more  SIGECOM 2003»
14 years 4 months ago
k-Implementation
This paper discusses an interested party who wishes to influence the behavior of agents in a game (multi-agent interaction), which is not under his control. The interested party ...
Dov Monderer, Moshe Tennenholtz
WPES
2003
ACM
14 years 4 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
CSFW
2002
IEEE
14 years 3 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey