Sciweavers

469 search results - page 53 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
ICCSA
2007
Springer
14 years 1 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
PERCOM
2010
ACM
13 years 6 months ago
Sensor.Network: An open data exchange for the web of things
Abstract—Tiny, wireless, sensors embedded in a large number of Internet-capable devices–smart phones, cameras, cars, toys, medical instruments, home appliances and energy meter...
Vipul Gupta, Arshan Poursohi, Poornaprajna Udupi
MOBICOM
2004
ACM
14 years 1 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
LREC
2008
169views Education» more  LREC 2008»
13 years 9 months ago
A Large-Scale Web Data Collection as a Natural Language Processing Infrastructure
In recent years, language resources acquired from the Web are released, and these data improve the performance of applications in several NLP tasks. Although the language resource...
Keiji Shinzato, Daisuke Kawahara, Chikara Hashimot...
SOSP
1997
ACM
13 years 9 months ago
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs
Multi-threaded programming is difficult and error prone. It is easy to make a mistake in synchronization that produces a data race, yet it can be extremely hard to locate this mi...
Stefan Savage, Michael Burrows, Greg Nelson, Patri...