Sciweavers

1369 search results - page 247 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 15 days ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
VIS
2006
IEEE
157views Visualization» more  VIS 2006»
16 years 1 days ago
Analyzing Complex FTMS Simulations: a Case Study in High-Level Visualization of Ion Motions
Current practice in particle visualization renders particle position data directly onto the screen as points or glyphs. Using a camera placed at a fixed position, particle motions...
Wojciech Burakiewicz, Robert van Liere
SIGSOFT
2008
ACM
15 years 11 months ago
Doloto: code splitting for network-bound web 2.0 applications
Modern Web 2.0 applications, such as GMail, Live Maps, Facebook and many others, use a combination of Dynamic HTML, JavaScript and other Web browser technologies commonly referred...
V. Benjamin Livshits, Emre Kiciman
SIGMOD
2009
ACM
190views Database» more  SIGMOD 2009»
15 years 11 months ago
Optimizing complex extraction programs over evolving text data
Most information extraction (IE) approaches have considered only static text corpora, over which we apply IE only once. Many real-world text corpora however are dynamic. They evol...
Fei Chen 0002, Byron J. Gao, AnHai Doan, Jun Yang ...
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 11 months ago
Fast range-summable random variables for efficient aggregate estimation
Exact computation for aggregate queries usually requires large amounts of memory ? constrained in data-streaming ? or communication ? constrained in distributed computation ? and ...
Florin Rusu, Alin Dobra