Sciweavers

5344 search results - page 909 / 1069
» Privacy-Preserving Set Operations
Sort
View
133
Voted
STOC
2007
ACM
111views Algorithms» more  STOC 2007»
16 years 3 months ago
Low-end uniform hardness vs. randomness tradeoffs for AM
In 1998, Impagliazzo and Wigderson [IW98] proved a hardness vs. randomness tradeoff for BPP in the uniform setting, which was subsequently extended to give optimal tradeoffs for t...
Ronen Shaltiel, Christopher Umans
234
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 3 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
210
Voted
VLDB
2007
ACM
131views Database» more  VLDB 2007»
16 years 3 months ago
Dissemination of compressed historical information in sensor networks
Sensor nodes are small devices that "measure" their environment and communicate feeds of low-level data values to a base station for further processing and archiving. Dis...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
139
Voted
SIGMOD
2005
ACM
166views Database» more  SIGMOD 2005»
16 years 3 months ago
Substructure Similarity Search in Graph Databases
Advanced database systems face a great challenge raised by the emergence of massive, complex structural data in bioinformatics, chem-informatics, and many other applications. The ...
Xifeng Yan, Philip S. Yu, Jiawei Han
PERCOM
2005
ACM
16 years 3 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis