Sciweavers

121 search results - page 6 / 25
» Data Assurance in Opaque Computations
Sort
View
VLDB
2007
ACM
115views Database» more  VLDB 2007»
15 years 9 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...
92
Voted
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 4 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
ICN
2005
Springer
15 years 3 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
CGI
1998
IEEE
15 years 1 months ago
Automatic 3D Model Acquisition from Uncalibrated Image Sequences
In this paper the problem of obtaining 3D models from image sequences is addressed. The proposed method deals with uncalibrated monocular image sequences. No prior knowledge about...
Reinhard Koch, Marc Pollefeys, Luc J. Van Gool
PODS
1994
ACM
131views Database» more  PODS 1994»
15 years 1 months ago
Constraint Checking with Partial Information
Abstract Appears in Proceedings of the Thirteenth Symposium on Principles of Database Systems, 1994 Ashish Gupta Yehoshua Sagivy Je rey D. Ullman Jennifer Widom Dept. of Computer S...
Ashish Gupta, Yehoshua Sagiv, Jeffrey D. Ullman, J...