Sciweavers

2316 search results - page 349 / 464
» The many forms of hypercomputation
Sort
View
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
15 years 8 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
PLDI
2010
ACM
15 years 7 months ago
DRFX: a simple and efficient memory model for concurrent programming languages
The most intuitive memory model for shared-memory multithreaded programming is sequential consistency (SC), but it disallows the use of many compiler and hardware optimizations th...
Daniel Marino, Abhayendra Singh, Todd D. Millstein...
CCS
2008
ACM
15 years 6 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
KDD
2010
ACM
250views Data Mining» more  KDD 2010»
15 years 6 months ago
On community outliers and their efficient detection in information networks
Linked or networked data are ubiquitous in many applications. Examples include web data or hypertext documents connected via hyperlinks, social networks or user profiles connected...
Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Su...
DAGSTUHL
2007
15 years 6 months ago
Forgetting and Update -- an exploration
Knowledge Update (respectively Erasure) and Forgetting are two very different concepts, with very different underlying motivation. Both are tools for knowledge management; however ...
Abhaya C. Nayak, Yin Chen, Fangzhen Lin