Sciweavers

1192 search results - page 93 / 239
» Computing Weakest Readings
Sort
View
168
Voted
CCS
2008
ACM
15 years 4 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
JCISE
2002
129views more  JCISE 2002»
15 years 3 months ago
Modeling Information Needs in Engineering Databases Using Tacit Knowledge
Online resources of engineering design information are a critical resource for practicing engineers. These online resources often contain references and content associated with te...
Shuang Song, Andy Dong, Alice M. Agogino
122
Voted
TIT
2010
124views Education» more  TIT 2010»
14 years 10 months ago
On the capacity of the precision-resolution system
Arguably, the most prominent constrained system in storage applications is the (d; k)-run-length limited (RLL) system, where every binary sequence obeys the constraint that every t...
Moshe Schwartz, Jehoshua Bruck
253
Voted
AIED
2011
Springer
14 years 7 months ago
Self-assessment of Motivation: Explicit and Implicit Indicators in L2 Vocabulary Learning
Self-assessment motivation questionnaires have been used in classrooms yet many researchers find only a weak correlation between answers to these questions and learning. In this pa...
Kevin Dela Rosa, Maxine Eskenazi
134
Voted
PPOPP
2009
ACM
16 years 4 months ago
A comprehensive strategy for contention management in software transactional memory
In Software Transactional Memory (STM), contention management refers to the mechanisms used to ensure forward progress-to avoid livelock and starvation, and to promote throughput ...
Michael F. Spear, Luke Dalessandro, Virendra J. Ma...