Sciweavers

3872 search results - page 555 / 775
» The Java memory model
Sort
View
127
Voted
IACR
2011
94views more  IACR 2011»
14 years 2 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
16 years 4 months ago
Optimizing Timestamp Management in Data Stream Management Systems
It has long been recognized that multi-stream operators, such as union and join, often have to wait idly in a temporarily blocked state, as a result of skews between the timestamp...
Yijian Bai, Hetal Thakkar, Haixun Wang, Carlo Zani...
ICML
2005
IEEE
16 years 3 months ago
Compact approximations to Bayesian predictive distributions
We provide a general framework for learning precise, compact, and fast representations of the Bayesian predictive distribution for a model. This framework is based on minimizing t...
Edward Snelson, Zoubin Ghahramani
111
Voted
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 3 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
104
Voted
VLSID
2006
IEEE
86views VLSI» more  VLSID 2006»
16 years 3 months ago
Partial Product Reduction Based on Look-Up Tables
In this paper a new technique for partial product reduction based on the use of look-up tables for efficient processing is presented. We describe how to construct counter devices ...
F. Pujol López, Higinio Mora Mora, Jer&oacu...