Sciweavers

2063 search results - page 385 / 413
» connection 2007
Sort
View
STOC
2007
ACM
102views Algorithms» more  STOC 2007»
16 years 24 days ago
Zero-knowledge from secure multiparty computation
A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multipar...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 24 days ago
The price of privacy and the limits of LP decoding
This work is at the intersection of two lines of research. One line, initiated by Dinur and Nissim, investigates the price, in accuracy, of protecting privacy in a statistical dat...
Cynthia Dwork, Frank McSherry, Kunal Talwar
101
Voted
STOC
2007
ACM
100views Algorithms» more  STOC 2007»
16 years 24 days ago
Reordering buffers for general metric spaces
In the reordering buffer problem, we are given an input sequence of requests for service each of which corresponds to a point in a metric space. The cost of serving the requests h...
Matthias Englert, Harald Räcke, Matthias West...
188
Voted
SIGMOD
2007
ACM
165views Database» more  SIGMOD 2007»
16 years 19 days ago
Sharing aggregate computation for distributed queries
An emerging challenge in modern distributed querying is to efficiently process multiple continuous aggregation queries simultaneously. Processing each query independently may be i...
Ryan Huebsch, Minos N. Garofalakis, Joseph M. Hell...
92
Voted
ICSE
2007
IEEE-ACM
16 years 17 days ago
Modeling in Software Engineering
A data model is a plan for building a database and is comparable to an architect's building plans. There are two major methodologies used to create a data model: the EntityRe...
Joanne M. Atlee, Robert B. France, Geri Georg, Ana...