Sciweavers

42388 search results - page 8305 / 8478
» Classification Using Information
Sort
View
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 8 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 8 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
VLDB
2005
ACM
162views Database» more  VLDB 2005»
15 years 8 months ago
FiST: Scalable XML Document Filtering by Sequencing Twig Patterns
In recent years, publish-subscribe (pub-sub) systems based on XML document filtering have received much attention. In a typical pubsub system, subscribed users specify their inte...
Joonho Kwon, Praveen Rao, Bongki Moon, Sukho Lee
VLDB
2005
ACM
116views Database» more  VLDB 2005»
15 years 8 months ago
Client Assignment in Content Dissemination Networks for Dynamic Data
Consider a content distribution network consisting of a set of sources, repositories and clients where the sources and the repositories cooperate with each other for efficient di...
Shetal Shah, Krithi Ramamritham, Chinya V. Ravisha...
VSTTE
2005
Springer
15 years 8 months ago
Performance Validation on Multicore Mobile Devices
The validation of modern software systems on mobile devices needs to incorporate both functional and non-functional requirements. While some progress has been made in validating pe...
Thomas Hubbard, Raimondas Lencevicius, Edu Metz, G...
« Prev « First page 8305 / 8478 Last » Next »