Sciweavers

804 search results - page 49 / 161
» On the Termination of the Chase Algorithm
Sort
View
121
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
STOC
2001
ACM
122views Algorithms» more  STOC 2001»
16 years 23 days ago
Provisioning a virtual private network: a network design problem for multicommodity flow
Consider a setting in which a group of nodes, situated in a large underlying network, wishes to reserve bandwidth on which to support communication. Virtual private networks (VPNs...
Anupam Gupta, Jon M. Kleinberg, Amit Kumar, Rajeev...
90
Voted
ICC
2007
IEEE
229views Communications» more  ICC 2007»
15 years 6 months ago
CD-MAC: Cooperative Diversity MAC for Robust Communication in Wireless Ad Hoc Networks
— This paper proposes a medium access control (MAC) algorithm, called Cooperative Diversity MAC (CD-MAC), which exploits the cooperative communication capability to improve robus...
Sangman Moh, Chansu Yu, Seung-Min Park, Heung-Nam ...
77
Voted
PPDP
2005
Springer
15 years 6 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost
66
Voted
IPPS
2003
IEEE
15 years 5 months ago
The Reconstruction of a Mobile Agent Computation and Its Validation
We propose a new representation to describe mobile agents computations, where the underlying control structures are diffusing computations. Usually, distributed coms are abstracte...
Mamoun Filali, Philippe Mauran, Gérard Padi...