Sciweavers

3272 search results - page 506 / 655
» Privacy in Data Publishing
Sort
View
UAI
2003
13 years 11 months ago
Exploiting Locality in Searching the Web
Published experiments on spidering the Web suggest that, given training data in the form of a (relatively small) subgraph of the Web containing a subset of a selected class of tar...
Joel Young, Thomas Dean
USITS
2003
13 years 11 months ago
Why Do Internet Services Fail, and What Can Be Done About It?
In 1986 Jim Gray published his landmark study of the causes of failures of Tandem systems and the techniques Tandem used to prevent such failures [6]. Seventeen years later, Inter...
David L. Oppenheimer, Archana Ganapathi, David A. ...
CCGRID
2010
IEEE
13 years 10 months ago
A Bi-criteria Algorithm for Scheduling Parallel Task Graphs on Clusters
Applications structured as parallel task graphs exhibit both data and task parallelism, and arise in many domains. Scheduling these applications on parallel platforms has been a lo...
Frédéric Desprez, Frédé...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 10 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
ICMCS
2010
IEEE
178views Multimedia» more  ICMCS 2010»
13 years 10 months ago
Optimal configuration of hash table based multimedia fingerprint databases using weak bits
The increasingly large amount of digital multimedia content has created a need for technologies to search and identify multimedia files. Multimedia fingerprinting has been widely ...
Claus Bauer, Regunathan Radhakrishnan, Wenyu Jiang