Sciweavers

204 search results - page 32 / 41
» A Half-Million Strong at Least
Sort
View
WWW
2008
ACM
15 years 10 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
CHI
2009
ACM
15 years 10 months ago
Towards systematic usability verification
Although usability is the core aspect of the whole HCI research field, it still waits for its economic breakthrough. There are some corporations that are famous for their usable p...
Jan Borchers, Jonathan Diehl, Markus Jordans, Max ...
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
15 years 10 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
PODS
2007
ACM
122views Database» more  PODS 2007»
15 years 9 months ago
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
The contingency table is a work horse of official statistics, the format of reported data for the US Census, Bureau of Labor Statistics, and the Internal Revenue Service. In many ...
Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Sat...
CCS
2009
ACM
15 years 4 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt