Sciweavers

INNOVATIONS
2014
78views more  INNOVATIONS 2014»
11 years 12 months ago
Lattice-based FHE as secure as PKE
We show that (leveled) fully homomorphic encryption (FHE) can be based on the hardness
Zvika Brakerski, Vinod Vaikuntanathan
IIR
2014
11 years 12 months ago
Evaluation of a Recursive Weighting Scheme for Federated Web Search
Abstract. The informative resources available on the Web are not always directly accessible and cannot therefore be crawled since access is permitted only through the adoption of a...
Emanuele Di Buccio, Ivano Masiero, Massimo Melucci
ICDCIT
2014
Springer
11 years 12 months ago
Hop and HipHop: Multitier Web Orchestration
Rich applications merge classical computing, client-server concurrency, web-based interfaces, and the complex time- and eventbased reactive programming found in embedded systems. T...
Gérard Berry, Manuel Serrano
EWSN
2014
Springer
11 years 12 months ago
NarrowCast: A New Link-Layer Primitive for Gossip-Based Sensornet Protocols
Abstract. Although gossiping protocols for wireless sensor networks (sensornets) excel at minimizing the number of generated packets, they leave room for improvement when it comes ...
Tomasz Pazurkiewicz, Michal Gregorczyk, Konrad Iwa...
EUROPAR
2014
Springer
11 years 12 months ago
Understanding Vertical Scalability of I/O Virtualization for MapReduce Workloads: Challenges and Opportunities
Abstract. As the explosion of data sizes continues to push the limits of our abilities to efficiently store and process big data, next generation big data systems face multiple ch...
Bogdan Nicolae
ESSOS
2014
Springer
11 years 12 months ago
Detecting Code Reuse Attacks with a Model of Conformant Program Execution
Abstract. Code reuse attacks circumvent traditional program protection mechanisms such as W ⊕ X by constructing exploits from code already present within a process. Existing tech...
Emily R. Jacobson, Andrew R. Bernat, William R. Wi...
ESORICS
2014
Springer
11 years 12 months ago
Quantifying and Measuring Anonymity
Abstract. The design of anonymous communication systems is a relatively new field, but the desire to quantify the security these systems offer has been an important topic of rese...
Steven J. Murdoch
ESOP
2014
Springer
11 years 12 months ago
Composable Transactional Objects: A Position Paper
Abstract. Memory transactions provide programmers with a convestraction for concurrent programs: a keyword (such as atomic) designating a region of code that appears, from the pers...
Maurice Herlihy, Eric Koskinen
ECIR
2014
Springer
11 years 12 months ago
Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization
Abstract. Relevance judgments are often the most expensive part of information retrieval evaluation, and techniques for comparing retrieval systems using fewer relevance judgments ...
Ning Gao, William Webber, Douglas W. Oard