Sciweavers

2669 search results - page 525 / 534
» Improvement of a configuration management system
Sort
View
IACR
2011
158views more  IACR 2011»
13 years 11 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
13 years 7 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
16 years 1 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin
ICDE
2001
IEEE
149views Database» more  ICDE 2001»
16 years 1 months ago
Selectivity Estimation for Spatial Joins
Spatial Joins are important and time consuming operations in spatial database management systems. It is crucial to be able to accurately estimate the performance of these operatio...
Ning An, Zhen-Yu Yang, Anand Sivasubramaniam
84
Voted
DAC
2009
ACM
16 years 21 days ago
Process variation characterization of chip-level multiprocessors
Within-die variation in leakage power consumption is substantial and increasing for chip-level multiprocessors (CMPs) and multiprocessor systems-on-chip. Dealing with this problem...
Lide Zhang, Lan S. Bai, Robert P. Dick, Li Shang, ...