Sciweavers

511 search results - page 52 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
STORAGESS
2005
ACM
15 years 9 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
MM
2004
ACM
152views Multimedia» more  MM 2004»
15 years 9 months ago
Manifold-ranking based image retrieval
In this paper, we propose a novel transductive learning framework named manifold-ranking based image retrieval (MRBIR). Given a query image, MRBIR first makes use of a manifold ra...
Jingrui He, Mingjing Li, HongJiang Zhang, Hanghang...
139
Voted
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 10 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
CONEXT
2008
ACM
15 years 5 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
SIGMETRICS
2008
ACM
214views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
HMTT: a platform independent full-system memory trace monitoring system
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Many appro...
Yungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianp...