Sciweavers

331 search results - page 43 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
SIGMOD
1997
ACM
146views Database» more  SIGMOD 1997»
15 years 1 months ago
Concurrency and Recovery in Generalized Search Trees
This paper presents general algorithms for concurrency control in tree-based access methods as well as a recovery protocol and a mechanism for ensuring repeatable read. The algori...
Marcel Kornacker, C. Mohan, Joseph M. Hellerstein
93
Voted
ISCA
2009
IEEE
199views Hardware» more  ISCA 2009»
15 years 4 months ago
SigRace: signature-based data race detection
Detecting data races in parallel programs is important for both software development and production-run diagnosis. Recently, there have been several proposals for hardware-assiste...
Abdullah Muzahid, Darío Suárez Graci...
EDBT
2008
ACM
111views Database» more  EDBT 2008»
15 years 9 months ago
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
Micro-data protection is a hot topic in the field of Statistical Disclosure Control (SDC), that has gained special interest after the disclosure of 658000 queries by the AOL searc...
Agusti Solanas, Francesc Sebé, Josep Doming...
ICS
2003
Tsinghua U.
15 years 2 months ago
miNI: reducing network interface memory requirements with dynamic handle lookup
Recent work in low-latency, high-bandwidth communication systems has resulted in building user–level Network InControllers (NICs) and communication abstractions that support dir...
Reza Azimi, Angelos Bilas
96
Voted
ECCV
2006
Springer
15 years 1 months ago
SIFT and Shape Context for Feature-Based Nonlinear Registration of Thoracic CT Images
Nonlinear image registration is a prerequisite for various medical image analysis applications. Many data acquisition protocols suffer from problems due to breathing motion which h...
Martin Urschler, Joachim Bauer, Hendrik Ditt, Hors...