Sciweavers

1175 search results - page 177 / 235
» Querying by examples
Sort
View
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 4 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
FOCS
2006
IEEE
14 years 4 months ago
Higher Lower Bounds for Near-Neighbor and Further Rich Problems
We convert cell-probe lower bounds for polynomial space into stronger lower bounds for near-linear space. Our technique applies to any lower bound proved through the richness meth...
Mihai Patrascu, Mikkel Thorup
SSDBM
2006
IEEE
129views Database» more  SSDBM 2006»
14 years 4 months ago
Indexing Time-Evolving Data With Variable Lifetimes
Many applicationsstore data items for a pre-determined, finite length of time. Examples include slidingwindows over on-line data streams, where old data are dropped as the window...
Lukasz Golab, Piyush Prahladka, M. Tamer Özsu
EXPDB
2006
ACM
14 years 4 months ago
A Reproducible Benchmark for P2P Retrieval
With the growing popularity of information retrieval (IR) in distributed systems and in particular P2P Web search, a huge number of protocols and prototypes have been introduced i...
Thomas Neumann, Matthias Bender, Sebastian Michel,...
UIST
2006
ACM
14 years 4 months ago
RecipeSheet: creating, combining and controlling information processors
Many tasks require users to extract information from diverse sources, to edit or process this information locally, and to explore how the end results are affected by changes in th...
Aran Lunzer, Kasper Hornbæk