Sciweavers

211 search results - page 32 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
SSD
2005
Springer
122views Database» more  SSD 2005»
14 years 3 months ago
Selectivity Estimation of High Dimensional Window Queries via Clustering
Abstract. Query optimization is an important functionality of modern database systems and often based on estimating the selectivity of queries before actually executing them. Well-...
Christian Böhm, Hans-Peter Kriegel, Peer Kr&o...
CASCON
1996
140views Education» more  CASCON 1996»
13 years 11 months ago
Improving cohesiveness and flexibility in systems management architectures using distributed object technologies over the intern
Management applications are sensitive to changes in application and system configuration. This coupling makes it difficult and expensive to develop management applications and kee...
Asham El Rayess, Vidar Vetland, Jerome A. Rolia, J...
CIKM
2008
Springer
13 years 12 months ago
Academic conference homepage understanding using constrained hierarchical conditional random fields
We address the problem of academic conference homepage understanding for the Semantic Web. This problem consists of three labeling tasks - labeling conference function pages, func...
Xin Xin, Juanzi Li, Jie Tang, Qiong Luo
ATAL
2008
Springer
13 years 12 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
IACR
2011
196views more  IACR 2011»
12 years 9 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs