In this paper we describe a prototype system for information retrieval on the Internet. Our idea is that the Web has to be searched both semantically and syntactically. In order t...
Carmine Cesarano, Antonio d'Acierno, Antonio Picar...
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
In this paper, we study efficient closed pattern mining in a general framework of set systems, which are families of subsets ordered by set-inclusion with a certain structure, pro...
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...