Sciweavers

569 search results - page 59 / 114
» Materialized Views in Oracle
Sort
View
ASIACRYPT
2001
Springer
15 years 3 months ago
Key-Privacy in Public-Key Encryption
We consider a novel security requirement of encryption schemes that we call “key-privacy” or “anonymity”. It asks that an eavesdropper in possession of a ciphertext not be ...
Mihir Bellare, Alexandra Boldyreva, Anand Desai, D...
CVPR
2007
IEEE
15 years 2 months ago
Diverse Active Ranking for Multimedia Search
Interactively learning from a small sample of unlabeled examples is an enormously challenging task, one that often arises in vision applications. Relevance feedback and more recen...
ShyamSundar Rajaram, Charlie K. Dagli, Nemanja Pet...
SIGIR
2010
ACM
15 years 2 months ago
Exploring the use of labels to shortcut search trails
Search trails comprising queries and Web page views are created as searchers engage in information-seeking activity online. During known-item search (where the objective may be to...
Ryen W. White, Raman Chandrasekar
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
15 years 18 days ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
INTERNET
2006
119views more  INTERNET 2006»
14 years 10 months ago
Toward a Grid-Based DBMS
level is a grid abstract machine, which consists of a collection of typed nodes -- data nodes (purple), director nodes (red), management nodes (orange), and various processing node...
Craig W. Thompson