Sciweavers

1450 search results - page 204 / 290
» A New General Purpose Parallel Database System
Sort
View
166
Voted
CASES
2010
ACM
15 years 2 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
WWW
2005
ACM
16 years 5 months ago
LSH forest: self-tuning indexes for similarity search
We consider the problem of indexing high-dimensional data for answering (approximate) similarity-search queries. Similarity indexes prove to be important in a wide variety of sett...
Mayank Bawa, Tyson Condie, Prasanna Ganesan
WPES
2003
ACM
15 years 10 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
129
Voted
WWW
2004
ACM
16 years 5 months ago
Liveclassifier: creating hierarchical text classifiers through web corpora
Many Web information services utilize techniques of information extraction (IE) to collect important facts from the Web. To create more advanced services, one possible method is t...
Chien-Chung Huang, Shui-Lung Chuang, Lee-Feng Chie...
KDD
2006
ACM
141views Data Mining» more  KDD 2006»
16 years 5 months ago
Statistical entity-topic models
The primary purpose of news articles is to convey information about who, what, when and where. But learning and summarizing these relationships for collections of thousands to mil...
David Newman, Chaitanya Chemudugunta, Padhraic Smy...