Sciweavers

2050 search results - page 376 / 410
» constraints 2010
Sort
View
SPAA
2010
ACM
14 years 12 days ago
Online capacity maximization in wireless networks
In this paper we study a dynamic version of capacity maximization in the physical model of wireless communication. In our model, requests for connections between pairs of points i...
Alexander Fanghänel, Sascha Geulen, Martin Ho...
STOC
2010
ACM
204views Algorithms» more  STOC 2010»
14 years 12 days ago
Interactive privacy via the median mechanism
We define a new interactive differentially private mechanism — the median mechanism — for answering arbitrary predicate queries that arrive online. Given fixed accuracy and...
Aaron Roth, Tim Roughgarden
APWEB
2010
Springer
14 years 12 days ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
ECMDAFA
2010
Springer
238views Hardware» more  ECMDAFA 2010»
14 years 12 days ago
eSPEM - A SPEM Extension for Enactable Behavior Modeling
OMG’s SPEM – by means of its (semi-)formal notation – allows for a detailed description of development processes and methodologies, but can only be used for a rather coarse d...
Ralf Ellner, Samir Al-Hilank, Johannes Drexler, Ma...
EUROCRYPT
2010
Springer
14 years 12 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...