Sciweavers

2095 search results - page 410 / 419
» Modeling and Querying Semi-structured Data
Sort
View
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 9 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
SIGMOD
2007
ACM
153views Database» more  SIGMOD 2007»
14 years 8 months ago
Scaling games to epic proportion
We introduce scalability for computer games as the next frontier for techniques from data management. A very important aspect of computer games is the artificial intelligence (AI)...
Walker M. White, Alan J. Demers, Christoph Koch, J...
PODS
2004
ACM
158views Database» more  PODS 2004»
14 years 8 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
ESWS
2009
Springer
14 years 3 months ago
ONKI SKOS Server for Publishing and Utilizing SKOS Vocabularies and Ontologies as Services
Vocabularies are the building blocks of the Semantic Web providing shared terminological resources for content indexing, information retrieval, data exchange, and content integrati...
Jouni Tuominen, Matias Frosterus, Kim Viljanen, Ee...
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 2 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg