Sciweavers

1816 search results - page 92 / 364
» Trace oblivious computation
Sort
View
PKC
2010
Springer
118views Cryptology» more  PKC 2010»
14 years 21 days ago
Text Search Protocols with Simulation Based Security
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P1 hold...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
SIGMOD
2010
ACM
204views Database» more  SIGMOD 2010»
13 years 11 months ago
Positional update handling in column stores
In this paper we investigate techniques that allow for on-line updates to columnar databases, leaving intact their high read-only performance. Rather than keeping differential str...
Sándor Héman, Marcin Zukowski, Niels...
E2EMON
2006
IEEE
14 years 4 months ago
PPrate: A Passive Capacity Estimation Tool
— Knowledge of link capacities is essential, e.g., for ISPs to troubleshoot paths outside the boundaries of their networks. However, the vast majority of capacity measurement too...
Taoufik En-Najjary, Guillaume Urvoy-Keller
EGH
2009
Springer
13 years 8 months ago
Understanding the efficiency of ray traversal on GPUs
We discuss the mapping of elementary ray tracing operations-acceleration structure traversal and primitive intersection--onto wide SIMD/SIMT machines. Our focus is on NVIDIA GPUs,...
Timo Aila, Samuli Laine
NDSS
2008
IEEE
14 years 5 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion