Sciweavers

6020 search results - page 1186 / 1204
» A New Approach to Model Counting
Sort
View
139
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 2 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 2 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
16 years 2 months ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...
VLDB
2007
ACM
226views Database» more  VLDB 2007»
16 years 2 months ago
SciPort: An Adaptable Scientific Data Integration Platform for Collaborative Scientific Research
Scientific data are posing new challenges to data management due to the large volume, complexity and heterogeneity of the data. Meanwhile, scientific collaboration becomes increas...
Fusheng Wang, Pierre-Emmanuel Bourgue, Georg Hacke...
SIGMOD
2009
ACM
213views Database» more  SIGMOD 2009»
16 years 2 months ago
Dictionary-based order-preserving string compression for main memory column stores
Column-oriented database systems [19, 23] perform better than traditional row-oriented database systems on analytical workloads such as those found in decision support and busines...
Carsten Binnig, Stefan Hildenbrand, Franz Fär...
« Prev « First page 1186 / 1204 Last » Next »