Sciweavers

2386 search results - page 318 / 478
» Database Security 2000
Sort
View
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 8 months ago
Automatic contention detection and amelioration for data-intensive operations
To take full advantage of the parallelism offered by a multicore machine, one must write parallel code. Writing parallel code is difficult. Even when one writes correct code, the...
John Cieslewicz, Kenneth A. Ross, Kyoho Satsumi, Y...
EUROCRYPT
2006
Springer
15 years 7 months ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...
ICIP
2000
IEEE
16 years 4 months ago
Efficient Video Similarity Measurement and Search
We consider the use of meta-data and/or video-domain methods to detect similar videos on the web. Meta-data is extracted from the textual and hyperlink information associated with...
Sen-Ching S. Cheung, Avideh Zakhor
ICDE
2000
IEEE
112views Database» more  ICDE 2000»
16 years 4 months ago
DEMON: Mining and Monitoring Evolving Data
Data mining algorithms have been the focus of much research recently. In practice, the input data to a data mining process resides in a large data warehouse whose data is kept up-...
Venkatesh Ganti, Johannes Gehrke, Raghu Ramakrishn...
210
Voted
ICDE
2000
IEEE
115views Database» more  ICDE 2000»
16 years 4 months ago
Optimization Techniques for Data-Intensive Decision Flows
For an enterprise to take advantage of the opportunities afforded by electronic commerce it must be able to make decisions about business transactions in near-realtime. In the com...
Bharat Kumar, François Llirbat, Gang Zhou, ...