Sciweavers

1744 search results - page 319 / 349
» What's There to Talk About
Sort
View
WPES
2003
ACM
14 years 2 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
BTW
2003
Springer
103views Database» more  BTW 2003»
14 years 2 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
ISCA
2002
IEEE
68views Hardware» more  ISCA 2002»
14 years 1 months ago
Timekeeping in the Memory System: Predicting and Optimizing Memory Behavior
Techniques for analyzing and improving memory referencing behavior continue to be important for achieving good overall program performance due to the ever-increasing performance g...
Zhigang Hu, Margaret Martonosi, Stefanos Kaxiras
ESWS
2010
Springer
14 years 1 months ago
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web
Abstract. With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. Howev...
Philipp Kärger, Wolf Siberski
ICALP
2010
Springer
14 years 1 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao