Results 1 - 10
of
145
Optimizing the Secure Evaluation of Twig Queries
- In VLDB
, 2002
"... The rapid emergence of XML as a standard for data exchange over the Web has led to considerable interest in the problem of securing XML documents. In this context, query eva]- uation engines need to ensure that user queries only use and return XML data the user is al- lowed to access. These ad ..."
Abstract
-
Cited by 48 (2 self)
- Add to MetaCart
. These added access control checks can considerably increase query evaluation time. In this paper, we consider the problem of optimizing the secure evaluation of XML twig queries.
A Discriminative Kernel-based Model to Rank Images from Text Queries
, 2007
"... This paper introduces a discriminative model for the retrieval of images from text queries. Our approach formalizes the retrieval task as a ranking problem, and introduces a learning procedure optimizing a criterion related to the ranking performance. The proposed model hence addresses the retrieva ..."
Abstract
-
Cited by 66 (13 self)
- Add to MetaCart
This paper introduces a discriminative model for the retrieval of images from text queries. Our approach formalizes the retrieval task as a ranking problem, and introduces a learning procedure optimizing a criterion related to the ranking performance. The proposed model hence addresses
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 841–848 ISBN 978-83-60810-22-4 Decomposition of SBQL Queries for Optimal Result Caching
"... Abstract—We present a new approach to optimization of query languages using cached results of previously evaluated queries. It is based on the stack-based approach (SBA) which assumes descriptionofsemanticsintheformofabstractimplementationof query/programming language constructs. Pragmatic universal ..."
Abstract
- Add to MetaCart
Abstract—We present a new approach to optimization of query languages using cached results of previously evaluated queries. It is based on the stack-based approach (SBA) which assumes descriptionofsemanticsintheformofabstractimplementationof query/programming language constructs. Pragmatic
Estimating Answer Sizes for XML Queries
- In Proceedings of the 8th International Conference on Extending Database Technology (EDBT
, 2002
"... Abstract. Estimating the sizes of query results, and intermediate results, is crucial to many aspects of query processing. In particular, it is necessary for effective query optimization. Even at the user level, predictions of the total result size can be valuable in “next-step ” decisions, such as ..."
Abstract
-
Cited by 59 (9 self)
- Add to MetaCart
Abstract. Estimating the sizes of query results, and intermediate results, is crucial to many aspects of query processing. In particular, it is necessary for effective query optimization. Even at the user level, predictions of the total result size can be valuable in “next-step ” decisions
Optimally Secure Tweakable Blockciphers
- Software Encryption - FSE 2015, volume 9054 of LNCS
, 2015
"... Abstract. We consider the generic design of a tweakable blockcipher from one or more evaluations of a classical blockcipher, in such a way that all input and output wires are of size n bits. As a first contribution, we show that any tweakable blockcipher with one primitive call and arbitrary linear ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
pre- and postprocessing functions can be distinguished from an ideal one with an attack complexity of about 2n/2. Next, we introduce the tweakable blockcipher F ̃ [1]. It consists of one multiplication and one blockcipher call with tweak-dependent key, and achieves 22n/3 security. Finally, we
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Improving the Security of MACs via Randomized Message Preprocessing
, 2007
"... Abstract "Hash then encrypt " is a popular approach to message authentication: first the message ishashed down using an "-universal hash function, and then the resulting k-bit value is encrypted,say with a block-cipher. The security of this scheme is proportional to &q ..."
Abstract
- Add to MetaCart
;quot;q2, where q is thenumber of MACs the adversary can request. As " is at least 2-k, the best one can hope for is O(q2/2k) security. Unfortunately, such small " is not achieved by simple constructions used inpractice, such as the polynomial evaluation or the Merkle
Parallel query evaluation as a Scientific Data Service
- In 2014 IEEE International Conference on Cluster Computing, CLUSTER 2014
"... Abstract—Scientific experiments and simulations produce mountains of data in file formats, such as HDF5, NetCDF, and FITS. Often, a relatively small amount of data holds the key to new scientific insight. Locating that critical information in these large files is challenging because existing solutio ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
targets to provide efficient data management optimizations as services. In this paper, we introduce the design and implementation of one such service, the parallel querying service. To answer the queries efficiently, we transparently augment user data with bitmap indexes and ordered datasets. We design
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
Weighted hypertree decompositions and optimal query plans
- In Proc. of PODS’04
, 2004
"... Hypertree width [22, 25] is a measure of the degree of cyclicity of hypergraphs. A number of relevant problems from different areas, e.g., the evaluation of conjunctive queries in database theory or the constraint satisfaction in AI, are tractable when their underlying hypergraphs have bounded hyper ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
Hypertree width [22, 25] is a measure of the degree of cyclicity of hypergraphs. A number of relevant problems from different areas, e.g., the evaluation of conjunctive queries in database theory or the constraint satisfaction in AI, are tractable when their underlying hypergraphs have bounded
Results 1 - 10
of
145