Sciweavers

2309 search results - page 385 / 462
» Using Meta-Structures in Database Design
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 6 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
13 years 6 months ago
Differentially Private Spatial Decompositions
— Differential privacy has recently emerged as the de facto standard for private data release. This makes it possible to provide strong theoretical guarantees on the privacy and ...
Graham Cormode, Cecilia M. Procopiuc, Divesh Sriva...
146
Voted
CLOUD
2010
ACM
15 years 9 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
142
Voted
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 7 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
CVPR
2009
IEEE
1356views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Average of Synthetic Exact Filters
This paper introduces a class of correlation filters called Average of Synthetic Exact Filters (ASEF). For ASEF, the correlation output is completely specified for each training ...
Bruce A. Draper, David S. Bolme, J. Ross Beveridge