Sciweavers

26496 search results - page 5145 / 5300
» An Approach to Computing Ethics
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 4 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 4 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
WLP
2007
Springer
15 years 4 months ago
spock: A Debugging Support Tool for Logic Programs under the Answer-Set Semantics
Answer-set programming (ASP) is an emerging logic-programming paradigm that strictly separates the description of a problem from its solving methods. Despite its semantic elegance,...
Martin Gebser, Jörg Pührer, Torsten Scha...
ANSS
2006
IEEE
15 years 4 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
CGO
2006
IEEE
15 years 4 months ago
Region Monitoring for Local Phase Detection in Dynamic Optimization Systems
Dynamic optimization relies on phase detection for two important functions (1) To detect change in code working set and (2) To detect change in performance characteristics that ca...
Abhinav Das, Jiwei Lu, Wei-Chung Hsu
« Prev « First page 5145 / 5300 Last » Next »