Sciweavers

3122 search results - page 89 / 625
» Storing Semistructured Data with STORED
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
IPPS
2006
IEEE
14 years 2 months ago
Coordinate transformation - a solution for the privacy problem of location based services?
Protecting location information of mobile users in Location Based Services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information h...
Andreas Gutscher
IEEEPACT
2005
IEEE
14 years 2 months ago
Memory State Compressors for Giga-Scale Checkpoint/Restore
We propose a checkpoint store compression method for coarse-grain giga-scale checkpoint/restore. This mechanism can be useful for debugging, post-mortem analysis and error recover...
Andreas Moshovos, Alexandros Kostopoulos
WEBI
2001
Springer
14 years 1 months ago
A Rough Set-Aided System for Sorting WWW Bookmarks
Most people store ‘bookmarks’ to web pages. These allow the user to return to a web page later on, without having to remember the exact URL address. People attempt to organise ...
Richard Jensen, Qiang Shen
VLSID
2000
IEEE
75views VLSI» more  VLSID 2000»
14 years 1 months ago
Timing Analysis with Implicitly Specified False Paths
We consider the problem of timing analysis in the presence of known false paths. The main difficulty in adaptation of classical breadth-first search to the problem is that at each...
Eugene Goldberg, Alexander Saldanha