Sciweavers

4679 search results - page 827 / 936
» Modeling When Connections Are the Problem
Sort
View
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
ECML
2003
Springer
15 years 3 months ago
Could Active Perception Aid Navigation of Partially Observable Grid Worlds?
Due to the unavoidable fact that a robot’s sensors will be limited in some manner, it is entirely possible that it can find itself unable to distinguish between differing state...
Paul A. Crook, Gillian Hayes
HPDC
2002
IEEE
15 years 3 months ago
Predicting Sporadic Grid Data Transfers
The increasingly common practice of replicating datasets and using resources as distributed data stores in Grid environments has led to the problem of determining which replica ca...
Sudharshan Vazhkudai, Jennifer M. Schopf
ITCC
2002
IEEE
15 years 3 months ago
A Methodology for Collection Selection in Heterogeneous Contexts
In this paper we demonstrate that in an ideal Distributed Information Retrieval environment, taking the ability of each collection server to return relevant documents into account...
Faiza Abbaci, Michel Beigbeder, Jacques Savoy
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 2 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso