Sciweavers

73 search results - page 10 / 15
» Partial Database Replication using Epidemic Communication
Sort
View
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
14 years 1 days ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
MOBISYS
2009
ACM
14 years 8 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
IPPS
2009
IEEE
14 years 2 months ago
The Weak Mutual Exclusion problem
In this paper we define the Weak Mutual Exclusion (WME) problem. Analogously to classical Distributed Mutual Exclusion (DME), WME serializes the accesses to a shared resource. Di...
Paolo Romano, Luís Rodrigues, Nuno Carvalho
ACII
2007
Springer
14 years 1 months ago
Facial Expression Synthesis Using PAD Emotional Parameters for a Chinese Expressive Avatar
Facial expression plays an important role in face to face communication in that it conveys nonverbal information and emotional intent beyond speech. In this paper, an approach for ...
Shen Zhang, Zhiyong Wu, Helen M. Meng, Lianhong Ca...
SPAA
1997
ACM
13 years 12 months ago
A Localized Algorithm for Parallel Association Mining
Discovery of association rules is an important database mining problem. Mining for association rules involves extracting patterns from large databases and inferring useful rules f...
Mohammed Javeed Zaki, Srinivasan Parthasarathy, We...