Sciweavers

1830 search results - page 255 / 366
» Implementing a Tamper-Evident Database System
Sort
View
TDP
2010
189views more  TDP 2010»
14 years 7 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
ICASSP
2011
IEEE
14 years 4 months ago
Iterative feature normalization for emotional speech detection
Contending with signal variability due to source and channel effects is a critical problem in automatic emotion recognition. Any approach in mitigating these effects however has t...
Carlos Busso, Angeliki Metallinou, Shrikanth S. Na...
CIKM
2011
Springer
14 years 22 days ago
Ranking-based processing of SQL queries
A growing number of applications are built on top of search engines and issue complex structured queries. This paper contributes a customisable ranking-based processing of such qu...
Hany Azzam, Thomas Roelleke, Sirvan Yahyaei
IACR
2011
113views more  IACR 2011»
14 years 13 days ago
Fully Homomorphic SIMD Operations
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations...
Nigel P. Smart, Frederik Vercauteren

Publication
502views
17 years 15 days ago
Spatio-Temporal Histograms
This paper presents a framework for building and continuously maintaining spatio-temporal histograms (ST-Histograms, for short). ST-Histograms are used for selectivity estimation o...
Hicham G. Elmongui, Mohamed F. Mokbel, Walid G. Ar...