Sciweavers

13863 search results - page 2712 / 2773
» Providing Database as a Service
Sort
View
135
Voted
TCC
2010
Springer
163views Cryptology» more  TCC 2010»
15 years 11 months ago
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Introduced by Micali, Rabin and Kilian (MRK), the basic primitive of zero-knowledge sets (ZKS) allows a prover to commit to a secret set S so as to be able to prove statements such...
Benoît Libert, Moti Yung
170
Voted
AVSS
2009
IEEE
15 years 11 months ago
A 3D Face Model for Pose and Illumination Invariant Face Recognition
Generative 3D face models are a powerful tool in computer vision. They provide pose and illumination invariance by modeling the space of 3D faces and the imaging process. The powe...
Pascal Paysan, Reinhard Knothe, Brian Amberg, Sami...
ISPASS
2009
IEEE
15 years 11 months ago
The data-centricity of Web 2.0 workloads and its impact on server performance
Advances in network performance and browser technologies, coupled with the ubiquity of internet access and proliferation of users, have lead to the emergence of a new class of web...
Moriyoshi Ohara, Priya Nagpurkar, Yohei Ueda, Kazu...
154
Voted
CCS
2009
ACM
15 years 10 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
HIPEAC
2009
Springer
15 years 10 months ago
Collective Optimization
Abstract. Iterative compilation is an efficient approach to optimize programs on rapidly evolving hardware, but it is still only scarcely used in practice due to a necessity to gat...
Grigori Fursin, Olivier Temam
« Prev « First page 2712 / 2773 Last » Next »