Sciweavers

6598 search results - page 1315 / 1320
» Graph Theory with Applications
Sort
View
184
Voted
INFOCOM
2011
IEEE
14 years 26 days ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
14 years 8 days ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 8 days ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
PODS
2011
ACM
238views Database» more  PODS 2011»
14 years 8 days ago
Beyond simple aggregates: indexing for summary queries
Database queries can be broadly classified into two categories: reporting queries and aggregation queries. The former retrieves a collection of records from the database that mat...
Zhewei Wei, Ke Yi
121
Voted
SIGECOM
2011
ACM
216views ECommerce» more  SIGECOM 2011»
14 years 8 days ago
Strategic sequential voting in multi-issue domains and multiple-election paradoxes
In many settings, a group of agents must come to a joint decision on multiple issues. In practice, this is often done by voting on the issues in sequence. In this paper, we model ...
Lirong Xia, Vincent Conitzer, Jérôme ...
« Prev « First page 1315 / 1320 Last » Next »