Sciweavers

2386 search results - page 302 / 478
» Database Security 2000
Sort
View
116
Voted
PRL
2000
148views more  PRL 2000»
15 years 3 months ago
One-dimensional representation of two-dimensional information for HMM based handwriting recognition
: In this study, we introduce a set of one-dimensional features to represent two dimensional shape information for HMM (Hidden Markov Model) based handwritten optical character rec...
Nafiz Arica, Fatos T. Yarman-Vural
SIGMOD
2000
ACM
173views Database» more  SIGMOD 2000»
15 years 3 months ago
javax.XXL: A prototype for a Library of Query processing Algorithms
In this paper we describe XXL (eXtensible and fleXible Library), a toolkit for rapid prototyping query processing algorithms. XXL is a flexible, high-level, platform independent J...
Jochen Van den Bercken, Jens-Peter Dittrich, Bernh...
122
Voted
EUROCRYPT
2009
Springer
16 years 4 months ago
Order-Preserving Symmetric Encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database community by Agrawal et al. (SIGMOD '04) for allowin...
Alexandra Boldyreva, Nathan Chenette, Younho Lee, ...
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 9 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
ECBS
2006
IEEE
126views Hardware» more  ECBS 2006»
15 years 9 months ago
Experiments and Investigations for the Personal High Performance Computing (PHPC) built on top of the 64-bit processing and clus
The motivation and objective for this paper is to demonstrate “Personal High Performance Computing (PHPC)”, which requires only a smaller number of computers, resources and sp...
Victor Chang