A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
Authenticating the query results of text search engines
2008
Proceedings of the VLDB Endowment
We formulate the properties that define a correct result, map the task of processing a text search query to adaptations of existing threshold-based algorithms, and devise an authentication scheme for checking ...
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. ...
The list signatures could be consolidated through an aggregated signature scheme [3] , so that only one signature is returned for the entire query result. ...
doi:10.14778/1453856.1453875
fatcat:zuqauz7plvb35frvd5lqtzkqh4
An Efficient Dynamic and Distributed RSA Accumulator
[article]
2009
arXiv
pre-print
Our accumulator-based scheme for authenticated dictionaries supports efficient incremental updates of the underlying set by insertions and deletions of elements. ...
on a set maintained by a trusted source. ...
Acknowledgments We would like to thank Andrew Schwerin, Giuseppe Ateniese, and Douglas Maughan for several helpful discussions and e-mail exchanges relating to the topics of this paper. ...
arXiv:0905.1307v1
fatcat:3v35inukfndtfmxftyxz3cjpii
A computational model for analytic column stores
[article]
2019
arXiv
pre-print
parallelization of query process on modern hardware. ...
A strict adherence to columnarity allows for a relatively simple and robust model; enabling extensive and intensive optimization of almost all aspects of query processing; and also enabling massive uniform ...
Boncz and Urbani , as well as Aris Koning of MonetDB Solutions B.V., for useful discussion and comments on earlier versions of this work. ...
arXiv:1904.12217v2
fatcat:3rehuab3fne4xb32guwgkhmxc4
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
[chapter]
2006
Lecture Notes in Computer Science
Notable prior work focused on various types of Authenticated Data Structures. Another prior approach involved the use of specialized digital signature schemes. ...
Our work analyzes the new approach for various base query types and compares it with Authenticated Data Structures. ...
Put another way, a VO is a set of all sibling nodes on the path from a given leaf to the root. (It is also sometimes referred to as a co-path.) ...
doi:10.1007/11733836_30
fatcat:m3ycccenozgirjdikbau2zimdm
WSDL term tokenization methods for IR-style Web services discovery
2012
Science of Computer Programming
The experiment suggests the superiority of MDL and PPM methods based on IR evaluation metrics. ...
Our solution can benefit source coding mining, in which a key step is to tokenize names (i.e. terms) of variables, functions, classes, modules, etc. for semantic analysis. ...
For example, in the first tokenization scheme in Table 2 The description of NMTOKENs D|M in Table 2 is represented as a permutation (i.e. choosing, re-ordering, and concatenating) of elements (repeatedly ...
doi:10.1016/j.scico.2011.08.001
fatcat:xsaswkdh7fcs7bjjfvzosmsesq
Document Retrieval: Expertise in Identifying Relevant Documents
1990
IEEE Data Engineering Bulletin
Along the same line, Stanfihl describes a parallel retrieval system based on the signature file. ...
The paper is focused on one particular text access technique, namely, the signature file. Variants of the signature file technique are presented and analyzed. ...
Acknowledgments The authors would like to acknowledge the contributions of Hong-Tai Chou to the design of the text search algorithm for ORION. ...
dblp:journals/debu/Smith90
fatcat:dlyur6m4wjdylanby4cy23jouu
Concatenative sound synthesis: The early years
2006
Journal of New Music Research
Concatenative sound synthesis is a promising method of musical sound synthesis with a steady stream of work and publications for over five years now. ...
The most urgent and interesting problems for further work on concatenative synthesis are listed concerning segmentation, descriptors, efficiency, legality, data mining, and real time interaction. ...
Malt for sharing his profound knowledge of the history of electronic music, to all the authors of the research mentioned here for their interesting work in the emerging field of concatenative synthesis ...
doi:10.1080/09298210600696857
fatcat:xli5g2n7prg5pin2z554mgxc5m
Modeling Integrity in Data Exchange
[chapter]
2004
Lecture Notes in Computer Science
Formally, a signature scheme is a five-tuple (P, A, K, S, V) where P is a set of possible messages, A is a set of possible signatures, and K is again the keyspace. ...
For a set of result tuples, the nodes in the tree the server must return are those on the hash path, which consist of all siblings of nodes on a path from a result tuple to the root. ...
doi:10.1007/978-3-540-30073-1_4
fatcat:r4xbk3iyhrfvlgzelhdz4viyba
Software Modularization with the EXODUS Optimizer Generator
1986
IEEE Data Engineering Bulletin
We report on the issues addressed in the design of the optimizer for the Logic Data Language (LDL) that is being designed and implemented at MCC. ...
In particular we motivate the new set of problems posed in this scenario and discuss one possible solution approach to tackle them. ...
I thank Jim Barnett, Brian Twichell, and Tim Wise for their comments and suggestions on earlier drafts of this article. ...
dblp:journals/debu/Graefe86
fatcat:nbwmagiblvcrhajlu452s5cybm
Theory and Practice of Bloom Filters for Distributed Systems
2012
IEEE Communications Surveys and Tutorials
This survey article presents a number of frequently used and useful probabilistic techniques. ...
This has been reflected in recent research and many new algorithms have been proposed for distributed systems that are either directly or indirectly based on Bloom filters. ...
ACKNOWLEDGEMENTS This work was supported by TEKES as part of the Future Internet program of TIVIT (Finnish Strategic Centre for Science, Technology and Innovation in the field of ICT). ...
doi:10.1109/surv.2011.031611.00024
fatcat:ziz4fwmd5jhizjvjpltaejhnmy
Musical Mosaicing with High Level Descriptors
2011
Zenodo
The essential components of a mosaicing system are described. Existing mosaicing systems are dissected and categorised into a taxonomy based on their potential application area. ...
This thesis investigates the use of high level descriptors (like genre, mood, instrumentation, singer's gender, etc.) in audio mosaicing, a form of data driven concatenative sound synthesis (CSS). ...
__doc__ for signature
Overrides: object. ...
doi:10.5281/zenodo.3734266
fatcat:vyow24xaxfekpam3z6wxzsrai4
Binary RDF for scalable publishing, exchanging and consumption in the web of data
2012
Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion
on a clear publication scheme. ...
Consumption can involve, as stated, a wide range of processes, from direct consumption to intensive processing and composition of data sources. ...
Nonetheless, we provide in the following a set of general decisions for post-processing and querying. ...
doi:10.1145/2187980.2187997
dblp:conf/www/Fernandez12
fatcat:j2rclthkdnanfbbnwym4smlno4
A Browser-Based Kerberos Authentication Scheme
[chapter]
2008
Lecture Notes in Computer Science
When two players wish to share a security token (e.g., for the purpose of authentication and accounting), they call a trusted third party. ...
We propose a browser-based Kerberos protocol based on client certificates and prove its security in the extended formal model for browserbased mutual authentication introduced at ACM ASIACCS'08. ...
Cookies can be persistent, i.e. they can be stored in the browser for a certain time, and they can be set for a target address that consists of a domain and a path within that domain. ...
doi:10.1007/978-3-540-88313-5_8
fatcat:avbwdpykkncr3aybqahzaufmye
Public-Key Infrastructure
[chapter]
2013
Wireless Mobile Internet Security
In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received. ...
Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and ...
The authors would also like to thank George Michaelson of APNIC for hosting the BBN RPKI software. ...
doi:10.1002/9781118512920.ch7
fatcat:hocfzfhi4rbuhmssop2hkwbc64
Gesture Recognition in Robotic Surgery: a Review
2021
IEEE Transactions on Biomedical Engineering
Selected articles were classified based on the level of supervision required for training and divided into different groups representing major frameworks for time series analysis and data modelling. ...
This paper reviews the state-of-the-art in methods for automatic recognition of fine-grained gestures in robotic surgery focusing on recent data-driven approaches and outlines the open questions and future ...
Given a surgical demonstration, the presence or absence of those attributes were detected on each video frame and compared to the set of signatures for action matching, achieving better results than fully ...
doi:10.1109/tbme.2021.3054828
pmid:33497324
fatcat:si5dcvrvnzc55dse6cst2k5tfi
« Previous
Showing results 1 — 15 out of 578 results