Sciweavers

1282 search results - page 177 / 257
» Signing on signing off
Sort
View
91
Voted
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
16 years 29 days ago
New degree bounds for polynomial threshold functions
A real multivariate polynomial p(x1, . . . , xn) is said to sign-represent a Boolean function f : {0, 1}n {-1, 1} if the sign of p(x) equals f(x) for all inputs x {0, 1}n. We gi...
Ryan O'Donnell, Rocco A. Servedio
190
Voted
VLDB
2007
ACM
161views Database» more  VLDB 2007»
16 years 27 days ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
179
Voted
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
16 years 27 days ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...
PERCOM
2007
ACM
16 years 8 days ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
111
Voted
MOBISYS
2007
ACM
16 years 7 days ago
Participatory user centered design techniques for a large scale ad-hoc health information system
During mass casualty incidents, an enormous amount of data, including the vital signs of the patients, the location of the patients, and the location of the first responders must ...
Tia Gao, Tammara Massey, Majid Sarrafzadeh, Leo Se...