Sciweavers

315 search results - page 39 / 63
» Algebraic Lower Bounds for Computing on Encrypted Data
Sort
View
111
Voted
SAC
2008
ACM
15 years 1 days ago
Secure deletion for NAND flash file system
In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require...
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong...
97
Voted
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
87
Voted
RTCSA
2007
IEEE
15 years 6 months ago
Virtual Full Replication by Adaptive Segmentation
We propose Virtual Full Replication by Adaptive segmentation (ViFuR-A), and evaluate its ability to maintain scalability in a replicated real-time database. With full replication ...
Gunnar Mathiason, Sten F. Andler, Sang Hyuk Son
102
Voted
PODS
2008
ACM
170views Database» more  PODS 2008»
16 years 20 days ago
Answering aggregate queries in data exchange
Data exchange, also known as data translation, has been extensively investigated in recent years. One main direction of research has focused on the semantics and the complexity of...
Foto N. Afrati, Phokion G. Kolaitis
103
Voted
KDD
2004
ACM
182views Data Mining» more  KDD 2004»
16 years 29 days ago
Rotation invariant distance measures for trajectories
For the discovery of similar patterns in 1D time-series, it is very typical to perform a normalization of the data (for example a transformation so that the data follow a zero mea...
Michail Vlachos, Dimitrios Gunopulos, Gautam Das