Sciweavers

1416 search results - page 138 / 284
» An Exact Interpretation of While
Sort
View
82
Voted
ESORICS
2007
Springer
15 years 7 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
84
Voted
ESORICS
2007
Springer
15 years 7 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 7 months ago
Learning noise
In this paper we propose a genetic programming approach to learning stochastic models with unsymmetrical noise distributions. Most learning algorithms try to learn from noisy data...
Michael D. Schmidt, Hod Lipson
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
15 years 7 months ago
A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation
Surrogate-Assisted Memetic Algorithm(SAMA) is a hybrid evolutionary algorithm, particularly a memetic algorithm that employs surrogate models in the optimization search. Since mos...
Dudy Lim, Yew-Soon Ong, Yaochu Jin, Bernhard Sendh...
ICALP
2007
Springer
15 years 7 months ago
Lower Bounds for Quantile Estimation in Random-Order and Multi-pass Streaming
We present lower bounds on the space required to estimate the quantiles of a stream of numerical values. Quantile estimation is perhaps the most studied problem in the data stream ...
Sudipto Guha, Andrew McGregor