Sciweavers

8266 search results - page 1649 / 1654
» Information About the Journal
Sort
View
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
13 years 9 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
WSDM
2012
ACM
254views Data Mining» more  WSDM 2012»
13 years 9 months ago
Maximizing product adoption in social networks
One of the key objectives of viral marketing is to identify a small set of users in a social network, who when convinced to adopt a product will influence others in the network l...
Smriti Bhagat, Amit Goyal 0002, Laks V. S. Lakshma...
WSDM
2012
ACM
207views Data Mining» more  WSDM 2012»
13 years 9 months ago
Domain bias in web search
This paper uncovers a new phenomenon in web search that we call domain bias — a user’s propensity to believe that a page is more relevant just because it comes from a particul...
Samuel Ieong, Nina Mishra, Eldar Sadikov, Li Zhang
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
13 years 4 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
PLDI
2012
ACM
13 years 4 months ago
Automated error diagnosis using abductive inference
When program verification tools fail to verify a program, either the program is buggy or the report is a false alarm. In this situation, the burden is on the user to manually cla...
Isil Dillig, Thomas Dillig, Alex Aiken
« Prev « First page 1649 / 1654 Last » Next »