Sciweavers

6562 search results - page 1227 / 1313
» Noetherianity and Combination Problems
Sort
View
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
15 years 10 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 10 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 10 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
WABI
2007
Springer
15 years 10 months ago
Shotgun Protein Sequencing
Although snake venom proteins have been proven instrumental in the design of blood clotting and cytostatic breast cancer drugs, the main method in use to sequence these unknown pr...
Pavel A. Pevzner
WDAG
2007
Springer
73views Algorithms» more  WDAG 2007»
15 years 10 months ago
On Self-stabilizing Synchronous Actions Despite Byzantine Attacks
Consider a distributed network of n nodes that is connected to a global source of “beats”. All nodes receive the “beats” simultaneously, and operate in lock-step. A scheme ...
Danny Dolev, Ezra N. Hoch
« Prev « First page 1227 / 1313 Last » Next »