578 Hits in 5.9 sec

Authenticating the query results of text search engines

HweeHwa Pang, Kyriakos Mouratidis
2008 Proceedings of the VLDB Endowment  
We formulate the properties that define a correct result, map the task of processing a text search query to adaptations of existing threshold-based algorithms, and devise an authentication scheme for checking  ...  The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines.  ...  The list signatures could be consolidated through an aggregated signature scheme [3] , so that only one signature is returned for the entire query result.  ... 
doi:10.14778/1453856.1453875 fatcat:zuqauz7plvb35frvd5lqtzkqh4

An Efficient Dynamic and Distributed RSA Accumulator [article]

Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic
2009 arXiv   pre-print
Our accumulator-based scheme for authenticated dictionaries supports efficient incremental updates of the underlying set by insertions and deletions of elements.  ...  on a set maintained by a trusted source.  ...  Acknowledgments We would like to thank Andrew Schwerin, Giuseppe Ateniese, and Douglas Maughan for several helpful discussions and e-mail exchanges relating to the topics of this paper.  ... 
arXiv:0905.1307v1 fatcat:3v35inukfndtfmxftyxz3cjpii

A computational model for analytic column stores [article]

Eyal Rozenberg
2019 arXiv   pre-print
parallelization of query process on modern hardware.  ...  A strict adherence to columnarity allows for a relatively simple and robust model; enabling extensive and intensive optimization of almost all aspects of query processing; and also enabling massive uniform  ...  Boncz and Urbani , as well as Aris Koning of MonetDB Solutions B.V., for useful discussion and comments on earlier versions of this work.  ... 
arXiv:1904.12217v2 fatcat:3rehuab3fne4xb32guwgkhmxc4

Authentication of Outsourced Databases Using Signature Aggregation and Chaining [chapter]

Maithili Narasimha, Gene Tsudik
2006 Lecture Notes in Computer Science  
Notable prior work focused on various types of Authenticated Data Structures. Another prior approach involved the use of specialized digital signature schemes.  ...  Our work analyzes the new approach for various base query types and compares it with Authenticated Data Structures.  ...  Put another way, a VO is a set of all sibling nodes on the path from a given leaf to the root. (It is also sometimes referred to as a co-path.)  ... 
doi:10.1007/11733836_30 fatcat:m3ycccenozgirjdikbau2zimdm

WSDL term tokenization methods for IR-style Web services discovery

Chen Wu
2012 Science of Computer Programming  
The experiment suggests the superiority of MDL and PPM methods based on IR evaluation metrics.  ...  Our solution can benefit source coding mining, in which a key step is to tokenize names (i.e. terms) of variables, functions, classes, modules, etc. for semantic analysis.  ...  For example, in the first tokenization scheme in Table 2 The description of NMTOKENs D|M in Table 2 is represented as a permutation (i.e. choosing, re-ordering, and concatenating) of elements (repeatedly  ... 
doi:10.1016/j.scico.2011.08.001 fatcat:xsaswkdh7fcs7bjjfvzosmsesq

Document Retrieval: Expertise in Identifying Relevant Documents

Philip J. Smith
1990 IEEE Data Engineering Bulletin  
Along the same line, Stanfihl describes a parallel retrieval system based on the signature file.  ...  The paper is focused on one particular text access technique, namely, the signature file. Variants of the signature file technique are presented and analyzed.  ...  Acknowledgments The authors would like to acknowledge the contributions of Hong-Tai Chou to the design of the text search algorithm for ORION.  ... 
dblp:journals/debu/Smith90 fatcat:dlyur6m4wjdylanby4cy23jouu

Concatenative sound synthesis: The early years

Diemo Schwarz
2006 Journal of New Music Research  
Concatenative sound synthesis is a promising method of musical sound synthesis with a steady stream of work and publications for over five years now.  ...  The most urgent and interesting problems for further work on concatenative synthesis are listed concerning segmentation, descriptors, efficiency, legality, data mining, and real time interaction.  ...  Malt for sharing his profound knowledge of the history of electronic music, to all the authors of the research mentioned here for their interesting work in the emerging field of concatenative synthesis  ... 
doi:10.1080/09298210600696857 fatcat:xli5g2n7prg5pin2z554mgxc5m

Modeling Integrity in Data Exchange [chapter]

Gerome Miklau, Dan Suciu
2004 Lecture Notes in Computer Science  
Formally, a signature scheme is a five-tuple (P, A, K, S, V) where P is a set of possible messages, A is a set of possible signatures, and K is again the keyspace.  ...  For a set of result tuples, the nodes in the tree the server must return are those on the hash path, which consist of all siblings of nodes on a path from a result tuple to the root.  ... 
doi:10.1007/978-3-540-30073-1_4 fatcat:r4xbk3iyhrfvlgzelhdz4viyba

Software Modularization with the EXODUS Optimizer Generator

Goetz Graefe
1986 IEEE Data Engineering Bulletin  
We report on the issues addressed in the design of the optimizer for the Logic Data Language (LDL) that is being designed and implemented at MCC.  ...  In particular we motivate the new set of problems posed in this scenario and discuss one possible solution approach to tackle them.  ...  I thank Jim Barnett, Brian Twichell, and Tim Wise for their comments and suggestions on earlier drafts of this article.  ... 
dblp:journals/debu/Graefe86 fatcat:nbwmagiblvcrhajlu452s5cybm

Theory and Practice of Bloom Filters for Distributed Systems

Sasu Tarkoma, Christian Esteve Rothenberg, Eemil Lagerspetz
2012 IEEE Communications Surveys and Tutorials  
This survey article presents a number of frequently used and useful probabilistic techniques.  ...  This has been reflected in recent research and many new algorithms have been proposed for distributed systems that are either directly or indirectly based on Bloom filters.  ...  ACKNOWLEDGEMENTS This work was supported by TEKES as part of the Future Internet program of TIVIT (Finnish Strategic Centre for Science, Technology and Innovation in the field of ICT).  ... 
doi:10.1109/surv.2011.031611.00024 fatcat:ziz4fwmd5jhizjvjpltaejhnmy

Musical Mosaicing with High Level Descriptors

John O'Connell
2011 Zenodo  
The essential components of a mosaicing system are described. Existing mosaicing systems are dissected and categorised into a taxonomy based on their potential application area.  ...  This thesis investigates the use of high level descriptors (like genre, mood, instrumentation, singer's gender, etc.) in audio mosaicing, a form of data driven concatenative sound synthesis (CSS).  ...  __doc__ for signature Overrides: object.  ... 
doi:10.5281/zenodo.3734266 fatcat:vyow24xaxfekpam3z6wxzsrai4

Binary RDF for scalable publishing, exchanging and consumption in the web of data

Javier D. Fernández
2012 Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion  
on a clear publication scheme.  ...  Consumption can involve, as stated, a wide range of processes, from direct consumption to intensive processing and composition of data sources.  ...  Nonetheless, we provide in the following a set of general decisions for post-processing and querying.  ... 
doi:10.1145/2187980.2187997 dblp:conf/www/Fernandez12 fatcat:j2rclthkdnanfbbnwym4smlno4

A Browser-Based Kerberos Authentication Scheme [chapter]

Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
2008 Lecture Notes in Computer Science  
When two players wish to share a security token (e.g., for the purpose of authentication and accounting), they call a trusted third party.  ...  We propose a browser-based Kerberos protocol based on client certificates and prove its security in the extended formal model for browserbased mutual authentication introduced at ACM ASIACCS'08.  ...  Cookies can be persistent, i.e. they can be stored in the browser for a certain time, and they can be set for a target address that consists of a domain and a path within that domain.  ... 
doi:10.1007/978-3-540-88313-5_8 fatcat:avbwdpykkncr3aybqahzaufmye

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received.  ...  Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and  ...  The authors would also like to thank George Michaelson of APNIC for hosting the BBN RPKI software.  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64

Gesture Recognition in Robotic Surgery: a Review

Beatrice Vanamsterdam, Matthew Clarkson, Danail Stoyanov
2021 IEEE Transactions on Biomedical Engineering  
Selected articles were classified based on the level of supervision required for training and divided into different groups representing major frameworks for time series analysis and data modelling.  ...  This paper reviews the state-of-the-art in methods for automatic recognition of fine-grained gestures in robotic surgery focusing on recent data-driven approaches and outlines the open questions and future  ...  Given a surgical demonstration, the presence or absence of those attributes were detected on each video frame and compared to the set of signatures for action matching, achieving better results than fully  ... 
doi:10.1109/tbme.2021.3054828 pmid:33497324 fatcat:si5dcvrvnzc55dse6cst2k5tfi
« Previous Showing results 1 — 15 out of 578 results