Sciweavers

8067 search results - page 1488 / 1614
» A Model Proposal of the Interoperability Problem
Sort
View
141
Voted
ICDCS
2011
IEEE
14 years 4 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
ICDE
2012
IEEE
252views Database» more  ICDE 2012»
13 years 7 months ago
Fuzzy Joins Using MapReduce
—Fuzzy/similarity joins have been widely studied in the research community and extensively used in real-world applications. This paper proposes and evaluates several algorithms f...
Foto N. Afrati, Anish Das Sarma, David Menestrina,...
178
Voted
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
CVPR
2012
IEEE
13 years 7 months ago
Unsupervised feature learning framework for no-reference image quality assessment
In this paper, we present an efficient general-purpose objective no-reference (NR) image quality assessment (IQA) framework based on unsupervised feature learning. The goal is to...
Peng Ye, Jayant Kumar, Le Kang, David S. Doermann
PODC
2012
ACM
13 years 7 months ago
On the price of equivocation in byzantine agreement
In the Byzantine agreement problem, a set of n processors, any f of whom may be arbitrarily faulty, must reach agreement on a value proposed by one of the correct processors. It i...
Alexander Jaffe, Thomas Moscibroda, Siddhartha Sen
« Prev « First page 1488 / 1614 Last » Next »