Sciweavers

3733 search results - page 518 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
136
Voted
IACR
2011
212views more  IACR 2011»
14 years 1 months ago
Fully Homomorphic Encryption without Bootstrapping
We present a radically new approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions. A central conceptual con...
Zvika Brakerski, Craig Gentry, Vinod Vaikuntanatha...
SIGMOD
2009
ACM
136views Database» more  SIGMOD 2009»
16 years 2 months ago
A comparison of approaches to large-scale data analysis
There is currently considerable enthusiasm around the MapReduce (MR) paradigm for large-scale data analysis [17]. Although the basic control flow of this framework has existed in ...
Andrew Pavlo, Erik Paulson, Alexander Rasin, Danie...
SAC
2003
ACM
15 years 7 months ago
UbiData: Ubiquitous Mobile File Service
One of the most challenging objectives of mobile data management is the ubiquitous, any time, anywhere access. This objective is very difficult to meet due to several network and ...
Jinsuo Zhang, Abdelsalam Helal, Joachim Hammer
SOSP
2001
ACM
15 years 10 months ago
SEDA: An Architecture for Well-Conditioned, Scalable Internet Services
We propose a new design for highly concurrent Internet services, which we call the staged event-driven architecture (SEDA). SEDA is intended to support massive concurrency demands...
Matt Welsh, David E. Culler, Eric A. Brewer
WWW
2005
ACM
16 years 2 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi