Sciweavers

560 search results - page 34 / 112
» Multiplication by a Constant is Sublinear
Sort
View
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
13 years 9 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...
SCN
2008
Springer
13 years 8 months ago
Linear Bandwidth Naccache-Stern Encryption
Abstract. The Naccache-Stern (ns) knapsack cryptosystem is an original yet little-known public-key encryption scheme. In this scheme, the ciphertext is obtained by multiplying publ...
Benoît Chevallier-Mames, David Naccache, Jac...
CCS
2011
ACM
12 years 8 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
ASYNC
1999
IEEE
76views Hardware» more  ASYNC 1999»
14 years 11 days ago
Real-Time Merging
We describe an extension of the virtual volume concept to multiple sensors. Data from multiple sensors are combined in real-time and mapped into a constantly updating three-dimens...
Mark R. Greenstreet
SODA
2003
ACM
158views Algorithms» more  SODA 2003»
13 years 9 months ago
Comparing top k lists
Motivated by several applications, we introduce various distance measures between “top k lists.” Some of these distance measures are metrics, while others are not. For each of...
Ronald Fagin, Ravi Kumar, D. Sivakumar