Sciweavers

6540 search results - page 129 / 1308
» Data Stream Sharing
Sort
View
129
Voted
MASCOTS
2000
15 years 4 months ago
An Efficient Implementation of Interactive Video-on-Demand
The key performance bottleneck for a video-on-demand (VOD) server is bandwidth, which controls the number of clients the server can simultaneously support. Previous work has shown...
Steven W. Carter, Darrell D. E. Long, Jehan-Fran&c...
206
Voted
LATINCRYPT
2010
15 years 2 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
125
Voted
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 7 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
186
Voted
ASPLOS
2012
ACM
13 years 11 months ago
Aikido: accelerating shared data dynamic analyses
Despite a burgeoning demand for parallel programs, the tools available to developers working on shared-memory multicore processors have lagged behind. One reason for this is the l...
Marek Olszewski, Qin Zhao, David Koh, Jason Ansel,...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 4 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng