Sciweavers

3047 search results - page 65 / 610
» A Secure Distributed Search System
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
15 years 4 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
ICPP
2008
IEEE
15 years 9 months ago
Bounded LSH for Similarity Search in Peer-to-Peer File Systems
Similarity search has been widely studied in peer-to-peer environments. In this paper, we propose the Bounded Locality Sensitive Hashing (Bounded LSH) method for similarity search...
Yu Hua, Bin Xiao, Dan Feng, Bo Yu
AGENTS
1998
Springer
15 years 7 months ago
A Multiagent Perspective of Parallel and Distributed Machine Learning
Parallel and distributed information processing systems play an increasingly important role in artificial intelligence and computer science. In this article an approach to learnin...
Gerhard Weiß
AINA
2007
IEEE
15 years 9 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
JCDL
2005
ACM
101views Education» more  JCDL 2005»
15 years 8 months ago
Grid-based digital libraries: cheshire3 and distributed retrieval
The University of California, Berkeley and the University of Liverpool are developing a Information Retrieval and Digital Library system (Cheshire3) that operates in both singlepr...
Ray R. Larson, Robert Sanderson