Sciweavers

7352 search results - page 1408 / 1471
» Universal access to information
Sort
View
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 2 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 2 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
WEBI
2007
Springer
14 years 2 months ago
PLF: A Publication List Web Page Finder for Researchers
Finding and keeping track of other researchers’ publication lists is an essential activity for every researcher, because they often contain citations not found elsewhere and may...
Kai-Hsiang Yang, Jen-Ming Chung, Jan-Ming Ho
ICDE
2006
IEEE
127views Database» more  ICDE 2006»
14 years 2 months ago
Processing Recursive XQuery over XML Streams: The Raindrop Approach
— XML stream applications bring the challenge of efficiently processing queries on sequentially accessible tokenbased data. For efficient processing of queries, we need to ensu...
Mingzhu Wei, Ming Li, Elke A. Rundensteiner, Mural...
ICPADS
2006
IEEE
14 years 2 months ago
Oriented Overlays For Clustering Client Requests To Data-Centric Network Services
Many of the data-centric network services deployed today hold massive volumes of data at their origin websites, and access the data to dynamically generate responses to user reque...
Congchun He, Vijay Karamcheti
« Prev « First page 1408 / 1471 Last » Next »