Sciweavers

14248 search results - page 2682 / 2850
» Queries
Sort
View
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 5 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
VTC
2007
IEEE
130views Communications» more  VTC 2007»
14 years 5 months ago
Data Stream Processing Infrastructure for Intelligent Transport Systems
— Intelligence Transportation Systems are critical to improve the efficiency of modern transportation by reducing congestions, providing real time road conditions. A system that...
Eric Bouillet, Mark Feblowitz, Zhen Liu, Anand Ran...
ICDS
2007
IEEE
14 years 5 months ago
On Smart-Care Services: Studies of Visually Impaired Users in Living Contexts
- Smart care technology is any sensor based technology used to aid and support human independent living. Such technologies offer new potential and can give rise to new problems for...
Ying Liu, Jean Bacon, Roger Wilson-Hinds
APPROX
2007
Springer
100views Algorithms» more  APPROX 2007»
14 years 4 months ago
Implementing Huge Sparse Random Graphs
Consider a scenario where one desires to simulate the execution of some graph algorithm on random input graphs of huge, perhaps even exponential size. Sampling and storing these h...
Moni Naor, Asaf Nussboim
ASIACRYPT
2007
Springer
14 years 4 months ago
When e-th Roots Become Easier Than Factoring
We show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the ...
Antoine Joux, David Naccache, Emmanuel Thomé...
« Prev « First page 2682 / 2850 Last » Next »