Sciweavers

1580 search results - page 130 / 316
» Non-Interference Through Determinism
Sort
View
CCS
2011
ACM
12 years 10 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
ICDCS
2011
IEEE
12 years 10 months ago
Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-level Control Approach
—Resource provisioning for N-tier web applications in Clouds is non-trivial due to at least two reasons. First, there is an inherent optimization conflict between cost of resour...
PengCheng Xiong, Zhikui Wang, Simon Malkowski, Qin...
CAISE
1999
Springer
14 years 2 months ago
Towards a Classification Framework for Application Granularity in Workflow Management Systems
The support of process enactment through the use of workflow management systems has gained considerable attention within the last few years. We develop a classification framework c...
Jörg Becker, Michael zur Muehlen
DAC
2012
ACM
12 years 23 days ago
WCET-centric partial instruction cache locking
Caches play an important role in embedded systems by bridging the performance gap between high speed processors and slow memory. At the same time, caches introduce imprecision in ...
Huping Ding, Yun Liang, Tulika Mitra
SDM
2012
SIAM
278views Data Mining» more  SDM 2012»
12 years 23 days ago
Legislative Prediction via Random Walks over a Heterogeneous Graph
In this article, we propose a random walk-based model to predict legislators’ votes on a set of bills. In particular, we first convert roll call data, i.e. the recorded votes a...
Jun Wang, Kush R. Varshney, Aleksandra Mojsilovic