Sciweavers

41 search results - page 4 / 9
» How to Build a Trusted Database System on Untrusted Storage
Sort
View
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
13 years 9 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 5 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
EDBTW
2010
Springer
13 years 9 months ago
Text-to-query: dynamically building structured analytics to illustrate textual content
Successfully structuring information in databases, OLAP cubes, and XML is a crucial element in managing data nowadays. However this process brought new challenges to usability. It...
Raphaël Thollot, Falk Brauer, Wojciech M. Bar...
PRL
2007
148views more  PRL 2007»
13 years 5 months ago
Damascening video databases for evaluation of face tracking and recognition - The DXM2VTS database
Performance quantification of biometric systems, such as face tracking and recognition highly depend on the database used for testing the systems. Systems trained and tested on r...
Dereje Teferi, Josef Bigün
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
14 years 6 months ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester