Sciweavers

5344 search results - page 234 / 1069
» Privacy-Preserving Set Operations
Sort
View
GECCO
2005
Springer
109views Optimization» more  GECCO 2005»
15 years 9 months ago
Investigations in meta-GAs: panaceas or pipe dreams?
A meta-GA (GA within a GA) is used to investigate evolving the parameter settings of genetic operators for genetic and evolutionary algorithms (GEA) in the hope of creating a self...
Jeff Clune, Sherri Goings, Bill Punch, Eric Goodma...
154
Voted
MDM
2005
Springer
174views Communications» more  MDM 2005»
15 years 9 months ago
GPAC: generic and progressive processing of mobile queries over mobile data
This paper introduces a new family of Generic and Progressive algorithms (GPAC, for short) for continuous mobile queries over mobile objects. GPAC provides a general skeleton that...
Mohamed F. Mokbel, Walid G. Aref
139
Voted
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 9 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
133
Voted
DBPL
2003
Springer
73views Database» more  DBPL 2003»
15 years 9 months ago
Updates and Incremental Validation of XML Documents
We consider the incremental validation of updates on XML documents. When a valid XML document (i.e., one satisfying some constraints) is updated, it has to be verified that the n...
Béatrice Bouchou, Mirian Halfeld Ferrari Al...