Sciweavers

960 search results - page 34 / 192
» There's no Data like More Data
Sort
View
EDBT
2008
ACM
113views Database» more  EDBT 2008»
14 years 7 months ago
Ensuring correctness over untrusted private database
In this paper we address the problem of ensuring the correctness of query results returned by an untrusted private database. The database owns the data and may modify it at any ti...
Sarvjeet Singh, Sunil Prabhakar
EUSAI
2007
Springer
14 years 1 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
CASES
2005
ACM
13 years 9 months ago
Compilation techniques for energy reduction in horizontally partitioned cache architectures
Horizontally partitioned data caches are a popular architectural feature in which the processor maintains two or more data caches at the same level of hierarchy. Horizontally part...
Aviral Shrivastava, Ilya Issenin, Nikil Dutt
ICANN
2005
Springer
14 years 1 months ago
The Topographic Product of Experts
- In this paper, we show how a topographic mapping can be created from a product of experts. We learn the parameters of the mapping using gradient descent on the negative logarithm...
Colin Fyfe
IPPS
2007
IEEE
14 years 2 months ago
Combining Compression, Encryption and Fault-tolerant Coding for Distributed Storage
Storing data in distributed systems aims to offer higher bandwidth and scalability than storing locally. But, a couple of disadvantageous issues must be taken into account such as...
Peter Sobe, Kathrin Peter