Sciweavers

586 search results - page 63 / 118
» Witnessing side effects
Sort
View
IPPS
2009
IEEE
15 years 11 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
139
Voted
DAWAK
2006
Springer
15 years 8 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
SAC
2011
ACM
14 years 7 months ago
Hierarchical comments-based clustering
Information resources on the Web like videos, images, and documents are increasingly becoming more “social” through user engagement via commenting systems. These commenting sy...
Chiao-Fang Hsu, James Caverlee, Elham Khabiri
ICFP
2009
ACM
16 years 5 months ago
Identifying query incompatibilities with evolving XML schemas
During the life cycle of an XML application, both schemas and queries may change from one version to another. Schema evolutions may affect query results and potentially the validi...
Nabil Layaïda, Pierre Genevès, Vincent...
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
16 years 5 months ago
Advances in flash memory SSD technology for enterprise database applications
The past few decades have witnessed a chronic and widening imbalance among processor bandwidth, disk capacity, and access speed of disk. According to Amdhal's law, the perfor...
Sang-Won Lee, Bongki Moon, Chanik Park