Sciweavers

5787 search results - page 1096 / 1158
» Generic User Modeling Systems
Sort
View
110
Voted
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 2 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
123
Voted
NSDI
2010
15 years 2 months ago
MapReduce Online
MapReduce is a popular framework for data-intensive distributed computing of batch jobs. To simplify fault tolerance, many implementations of MapReduce materialize the entire outp...
Tyson Condie, Neil Conway, Peter Alvaro, Joseph M....
101
Voted
FORTE
2004
15 years 2 months ago
Localizing Program Errors for Cimple Debugging
Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
Samik Basu, Diptikalyan Saha, Scott A. Smolka
78
Voted
EGITALY
2006
15 years 2 months ago
Real-time Cataract Surgery Simulation for Training
Cataract is a clouding of the eye's natural lens, normally due to natural aging changes, and involving at least half of the population over 65 years. Cataract extraction is t...
Marco Agus, Enrico Gobbetti, Giovanni Pintore, Gia...
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 2 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
« Prev « First page 1096 / 1158 Last » Next »