Sciweavers

65 search results - page 11 / 13
» Efficient Set Operations in the Presence of Malicious Advers...
Sort
View
ESORICS
2010
Springer
13 years 7 months ago
Optimistic Fair Exchange with Multiple Arbiters
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has something that Bob wants, and Bob has something that Alice wants. A fair exchang...
Alptekin Küpçü, Anna Lysyanskaya
DASFAA
2003
IEEE
146views Database» more  DASFAA 2003»
13 years 11 months ago
Cost-Driven Storage Schema Selection for XML
Various models and approaches have been proposed for mapping XML data into relational tables recently. Most of those approaches produce relational schema for given XML data, based...
Shihui Zheng, Ji-Rong Wen, Hongjun Lu
PRESENCE
2006
104views more  PRESENCE 2006»
13 years 6 months ago
Physically Realistic Virtual Surgery Using the Point-Associated Finite Field (PAFF) Approach
The generation of multimodal virtual environments for surgical training is complicated by the necessity to develop heterogeneous simulation scenarios such as surgical incision, ca...
Suvranu De, Yi-Je Lim, Manivannan Muniyandi, Manda...
VLDB
2003
ACM
115views Database» more  VLDB 2003»
14 years 6 months ago
Lineage tracing for general data warehouse transformations
Data warehousing systems integrate information from operational data sources into a central repository to enable analysis and mining of the integrated information. During the integ...
Yingwei Cui, Jennifer Widom
USENIX
2008
13 years 8 months ago
Context-Aware Mechanisms for Reducing Interactive Delays of Energy Management in Disks
Aggressive energy conserving mechanisms can maximize energy efficiency, but often have the negative tradeoff of simultaneously reducing system responsiveness due to the switching ...
Igor Crk, Chris Gniady