Sciweavers

12438 search results - page 2482 / 2488
» The Magic of a Number System
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
12 years 10 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
NAR
2011
215views Computer Vision» more  NAR 2011»
12 years 10 months ago
LSD: a leaf senescence database
By broad literature survey, we have developed a leaf senescence database (LSD, http://www .eplantsenescence.org/) that contains a total of 1145 senescence associated genes (SAGs) ...
Xiao-Chuan Liu, Zhonghai Li, Zhiqiang Jiang, Yi Zh...
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 10 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
PODS
2011
ACM
220views Database» more  PODS 2011»
12 years 10 months ago
Maximizing conjunctive views in deletion propagation
In deletion propagation, tuples from the database are deleted in order to reflect the deletion of a tuple from the view. Such an operation may result in the (often necessary) del...
Benny Kimelfeld, Jan Vondrák, Ryan Williams
PVLDB
2011
12 years 10 months ago
Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration
Database systems serving cloud platforms must serve large numbers of applications (or tenants). In addition to managing tenants with small data footprints, different schemas, and ...
Sudipto Das, Shoji Nishimura, Divyakant Agrawal, A...
« Prev « First page 2482 / 2488 Last » Next »