Sciweavers

315 search results - page 37 / 63
» Algebraic Lower Bounds for Computing on Encrypted Data
Sort
View
97
Voted
SENSYS
2004
ACM
15 years 6 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
98
Voted
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 6 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
IM
2006
15 years 16 days ago
Estimating Entropy and Entropy Norm on Data Streams
We consider the problem of computing information theoretic functions such as entropy on a data stream, using sublinear space. Our first result deals with a measure we call the &quo...
Amit Chakrabarti, Khanh Do Ba, S. Muthukrishnan
SSDBM
2005
IEEE
115views Database» more  SSDBM 2005»
15 years 6 months ago
Using Multi-Scale Histograms to Answer Pattern Existence and Shape Match Queries
Similarity-based querying of time series data can be categorized as pattern existence queries and shape match queries. Pattern existence queries find the time series data with ce...
Lei Chen 0002, M. Tamer Özsu, Vincent Oria
93
Voted
SDM
2009
SIAM
104views Data Mining» more  SDM 2009»
15 years 9 months ago
On Randomness Measures for Social Networks.
Social networks tend to contain some amount of randomness and some amount of non-randomness. The amount of randomness versus non-randomness affects the properties of a social netw...
Xiaowei Ying, Xintao Wu