Sciweavers

2272 search results - page 240 / 455
» Provable Data Privacy
Sort
View
111
Voted
OOPSLA
2007
Springer
15 years 7 months ago
Elephant 2000: a programming language based on speech acts
: Elephant 2000 is a vehicle for some ideas about programming language features. We expect these features to be valuable in writing and verifying programs that interact with people...
John McCarthy
123
Voted
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 7 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
79
Voted
ISI
2006
Springer
15 years 1 months ago
A First Look at Domestic and International Global Terrorism Events, 1970-1997
While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents on...
Laura Dugan, Gary LaFree, Heather Fogg
213
Voted
SIGMOD
2005
ACM
143views Database» more  SIGMOD 2005»
16 years 1 months ago
Holistic Aggregates in a Networked World: Distributed Tracking of Approximate Quantiles
While traditional database systems optimize for performance on one-shot queries, emerging large-scale monitoring applications require continuous tracking of complex aggregates and...
Graham Cormode, Minos N. Garofalakis, S. Muthukris...
112
Voted
WABI
2005
Springer
120views Bioinformatics» more  WABI 2005»
15 years 6 months ago
Multiple Structural RNA Alignment with Lagrangian Relaxation
In contrast to proteins, many classes of functionally related RNA molecules show a rather weak sequence conservation but instead a fairly well conserved secondary structure. Hence ...
Markus Bauer, Gunnar W. Klau, Knut Reinert