Sciweavers

4037 search results - page 758 / 808
» Routing without ordering
Sort
View
ESOP
2008
Springer
13 years 10 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
ALENEX
2010
156views Algorithms» more  ALENEX 2010»
13 years 10 months ago
Tabulation Based 5-Universal Hashing and Linear Probing
Previously [SODA'04] we devised the fastest known algorithm for 4-universal hashing. The hashing was based on small pre-computed 4-universal tables. This led to a five-fold i...
Mikkel Thorup, Yin Zhang
BIS
2007
178views Business» more  BIS 2007»
13 years 10 months ago
A Conversion Process From Flickr Tags to RDF Descriptions
The recent evolution of the Web, now designated by the term Web 2.0, has seen the appearance of a huge number of resources created and annotated by users. However the annotations ...
Mohamed Zied Maala, Alexandre Delteil, Ahmed Azoug...
DIMVA
2010
13 years 10 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
CATS
2008
13 years 10 months ago
Tractable Cases of the Extended Global Cardinality Constraint
We study the consistency problem for extended global cardinality (EGC) constraints. An EGC constraint consists of a set X of variables, a set D of values, a domain D(x) D for eac...
Marko Samer, Stefan Szeider