Sciweavers

108 search results - page 8 / 22
» The BANCA Database and Evaluation Protocol
Sort
View
DEXAW
2004
IEEE
97views Database» more  DEXAW 2004»
14 years 2 months ago
A Selective Border-Casting Zone Routing Protocol for Ad-hoc Networks
One of well-known routing protocol for ad-hoc networks is Zone Routing Protocol (ZRP). The performance of ZRP is better than other protocols. However, many useless control packets...
Leonard Barolli, Yoshitaka Honma, Akio Koyama, Arj...
IACR
2011
94views more  IACR 2011»
12 years 10 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
FC
2009
Springer
67views Cryptology» more  FC 2009»
14 years 2 months ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov
XSYM
2007
Springer
119views Database» more  XSYM 2007»
14 years 5 months ago
SXDGL: Snapshot Based Concurrency Control Protocol for XML Data
Nowadays, concurrency control for XML data is a big research problem. There are a number of researchers working on this problem, but most of the proposed methods are based on the ...
Peter Pleshachkov, Sergei Kuznetcov
ICDAR
2009
IEEE
14 years 5 months ago
Results of the RIMES Evaluation Campaign for Handwritten Mail Processing
This paper presents the results of the second test phase of the RIMES1 evaluation campaign. The latter is the first large-scale evaluation campaign intended to all the key players...
Emmanuele Grosicki, Matthieu Carré, Jean-Ma...