Sciweavers

8972 search results - page 54 / 1795
» Private Information Retrieval
Sort
View
115
Voted
WWW
2008
ACM
16 years 1 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
109
Voted
EUROCRYPT
2000
Springer
15 years 4 months ago
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to communicate privately. In this paper we consider in...
Ueli M. Maurer, Stefan Wolf
93
Voted
IAT
2009
IEEE
15 years 7 months ago
Creating Incentives to Prevent Intentional Execution Failures
—When information or control in a multiagent system is private to the agents, they may misreport this information or refuse to execute an agreed outcome, in order to change the r...
Yingqian Zhang, Mathijs de Weerdt
85
Voted
CAISE
2001
Springer
15 years 4 months ago
The P2P Approach to Interorganizational Workflows
This paper describes in an informal way the Public-To-Private (P2P) approach to interorganizational workflows, which is based on a notion of inheritance. The approach consists of t...
Wil M. P. van der Aalst, Mathias Weske
WWW
2007
ACM
16 years 1 months ago
Privacy-enhancing personalized web search
Personalized web search is a promising way to improve search quality by customizing search results for people with individual information goals. However, users are uncomfortable w...
Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen