Sciweavers

560 search results - page 14 / 112
» Multiplication by a Constant is Sublinear
Sort
View
CCS
2008
ACM
13 years 10 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
WABI
2009
Springer
132views Bioinformatics» more  WABI 2009»
14 years 2 months ago
mpscan: Fast Localisation of Multiple Reads in Genomes
Abstract. With Next Generation Sequencers, sequence based transcriptomic or epigenomic assays yield millions of short sequence reads that need to be mapped back on a reference geno...
Eric Rivals, Leena Salmela, Petteri Kiiskinen, Pet...
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
14 years 9 days ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
CDC
2008
IEEE
157views Control Systems» more  CDC 2008»
13 years 8 months ago
A hidden Markov filtering approach to multiple change-point models
We describe a hidden Markov modeling approach to multiple change-points that has attractive computational and statistical properties. This approach yields explicit recursive filter...
Tze Leung Lai, Haipeng Xing
ICALP
2007
Springer
14 years 2 months ago
Low Distortion Spanners
A spanner of an undirected unweighted graph is a subgraph that approximates the distance metric of the original graph with some specified accuracy. Specifically, we say H ⊆ G i...
Seth Pettie