Sciweavers

215 search results - page 10 / 43
» Tabling with Answer Subsumption: Implementation, Application...
Sort
View
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 9 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
DAC
1995
ACM
14 years 21 days ago
A Method for Finding Good Ashenhurst Decompositions and Its Application to FPGA Synthesis
—In this paper, we present an algorithm for finding a good Ashenhurst decomposition of a switching function. Most current methods for performing this type of decomposition are ba...
Ted Stanion, Carl Sechen
WETICE
2009
IEEE
14 years 3 months ago
UniWiki: A Collaborative P2P System for Distributed Wiki Applications
The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. Wh...
Gérald Oster, Pascal Molli, Sergiu Dumitriu...
SIGMOD
2009
ACM
215views Database» more  SIGMOD 2009»
14 years 9 months ago
Efficient type-ahead search on relational data: a TASTIER approach
Existing keyword-search systems in relational databases require users to submit a complete query to compute answers. Often users feel "left in the dark" when they have l...
Guoliang Li, Shengyue Ji, Chen Li, Jianhua Feng
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 3 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang