Sciweavers

92 search results - page 13 / 19
» On Answering Queries in the Presence of Limited Access Patte...
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 2 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
EDBT
2004
ACM
122views Database» more  EDBT 2004»
14 years 8 months ago
Sketch-Based Multi-query Processing over Data Streams
Abstract. Recent years have witnessed an increasing interest in designing algorithms for querying and analyzing streaming data (i.e., data that is seen only once in a fixed order) ...
Alin Dobra, Minos N. Garofalakis, Johannes Gehrke,...
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 8 months ago
How Efficient Can Memory Checking Be?
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...
AICCSA
2005
IEEE
112views Hardware» more  AICCSA 2005»
14 years 1 months ago
Multilevel chunking of multidimensional arrays
Multidimensional arrays have become very common in scientific and business applications. Such arrays are usually very large and hence they are stored on secondary or tertiary stor...
A. S. Sawires, Nagwa M. El-Makky, Khalil M. Ahmed
CIKM
2009
Springer
14 years 2 months ago
Incremental query evaluation for support vector machines
Support vector machines (SVMs) have been widely used in multimedia retrieval to learn a concept in order to find the best matches. In such a SVM active learning environment, the ...
Danzhou Liu, Kien A. Hua