Sciweavers

2714 search results - page 27 / 543
» Under the table interaction
Sort
View
ICDE
2009
IEEE
176views Database» more  ICDE 2009»
14 years 10 months ago
Efficient Table Anonymization for Aggregate Query Answering
Abstract-- Privacy protection is a major concern when microdata needs to be released for ad hoc analyses. This has led to a lot of recent research in privacy goals and table anonym...
Cecilia M. Procopiuc, Divesh Srivastava
SAINT
2006
IEEE
14 years 2 months ago
PaxonDHT: Achieving Consensus in Distributed Hash Tables
Despite the scalability, availability and resiliency potential suggested by Distributed Hash Tables, their lack of support for replication of mutable data and for strong consisten...
Ben Temkow, Anne-Marie Bosneag, Xinjie Li, Monica ...
CSDA
2007
123views more  CSDA 2007»
13 years 8 months ago
Bayesian estimation of unrestricted and order-restricted association models for a two-way contingency table
In two-way contingency tables analysis, a popular class of models for describing the structure of the association between the two categorical variables are the so-called “associ...
G. Iliopoulos, Maria Kateri, Ioannis Ntzoufras
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 2 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
CAV
1997
Springer
102views Hardware» more  CAV 1997»
14 years 5 days ago
Efficient Model Checking Using Tabled Resolution
We demonstrate the feasibility of using the XSB tabled logic programming system as a programmable fixed-point engine for implementing efficient local model checkers. In particular,...
Y. S. Ramakrishna, C. R. Ramakrishnan, I. V. Ramak...