Sciweavers

415 search results - page 31 / 83
» Performance evaluation of an enterprise JavaBean server impl...
Sort
View
213
Voted
VLDB
2007
ACM
155views Database» more  VLDB 2007»
16 years 3 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
190
Voted
EDO
2006
Springer
15 years 6 months ago
An extensible, lightweight architecture for adaptive J2EE applications
Server applications with adaptive behaviors can adapt their functionality in response to environmental changes, and significantly reduce the on-going costs of system deployment an...
Ian Gorton, Yan Liu, Nihar Trivedi
113
Voted
FC
2009
Springer
67views Cryptology» more  FC 2009»
15 years 6 months ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov
120
Voted
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 9 months ago
A destructive evolutionary process: a pilot implementation
This paper describes the application of evolutionary search to the problem of Flash memory wear-out. The operating parameters of Flash memory are notoriously difficult to determin...
Joe Sullivan, Conor Ryan
124
Voted
FAST
2007
15 years 4 months ago
Strong Accountability for Network Storage
This paper presents the design, implementation, and evaluation of CATS, a network storage service with strong accountability properties. A CATS server annotates read and write res...
Aydan R. Yumerefendi, Jeffrey S. Chase