• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 409
Next 10 →

A Succinct Physical Storage Scheme for Efficient Evaluation

by Ning Zhang - of Path Queries in XML. In ICDE’04, pages 54 – 65 , 2004
"... Path expressions are ubiquitous in XML processing languages. Existing approaches evaluate a path expression by selecting nodes that satisfies the tag-name and value constraints and then joining them according to the structural constraints. In this paper, we propose a novel approach, next-of-kin (NoK ..."
Abstract - Cited by 38 (12 self) - Add to MetaCart
K) pattern matching, to speed up the nodeselection step, and to reduce the join size significantly in the second step. To efficiently perform NoK pattern matching, we also propose a succinct XML physical storage scheme that is adaptive to updates and streaming XML as well. Our performance results demonstrate

Nonlinear Neural Networks: Principles, Mechanisms, and Architectures

by Stephen Grossberg , 1988
"... An historical discussion is provided of the intellectual trends that caused nineteenth century interdisciplinary studies of physics and psychobiology by leading scientists such as Helmholtz, Maxwell, and Mach to splinter into separate twentieth-century scientific movements. The nonlinear, nonstatio ..."
Abstract - Cited by 262 (21 self) - Add to MetaCart
An historical discussion is provided of the intellectual trends that caused nineteenth century interdisciplinary studies of physics and psychobiology by leading scientists such as Helmholtz, Maxwell, and Mach to splinter into separate twentieth-century scientific movements. The nonlinear

Succinct Representations of Separable Graphs

by Guy E. Blelloch, Arash Farzan
"... Abstract. We consider the problem of highly space-efficient representation of separable graphs while supporting queries in constant time in the RAM with logarithmic word size. In particular, we show constanttime support for adjacency, degree and neighborhood queries. For any monotone class of separa ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. In particular, planar graphs (genus 0) are separable and our scheme gives the first succinct representation of planar graphs with a storage requirement that matches the information-theory minimum to within lower order terms with constant time support for the queries. We, furthers, show that we can also modify

Succinct Representation of Flexible and

by unknown authors
"... The date of receipt and acceptance will be inserted by the editor Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access control means that the service provider can neither learn w ..."
Abstract - Add to MetaCart
to and be charged only for the items selected. And portability of access rights means that the rights themselves can be stored on small devices of limited storage space and computational capabilities such as smartcards or sensors, and therefore the rights must be enforced using the limited resources available

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - In INFOCOM , 2010
"... Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relie ..."
Abstract - Cited by 135 (1 self) - Add to MetaCart
be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users

Ensuring data storage security in cloud computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - in Proc. of IWQoS’09 , 2009
"... Abstract—Cloud Computing has been envisioned as the nextgeneration architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data cent ..."
Abstract - Cited by 84 (3 self) - Add to MetaCart
of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance

Strong Security for Network-Attached Storage

by Ethan L. Miller, William E. Freeman, Darrell D. E. Long, Benjamin C. Reed - In Proceedings of the 2002 Conference on File and Storage Technologies (FAST , 2002
"... We have developed a scheme to secure networkattached storage systems against many types of attacks. Our system uses strong cryptography to hide data from unauthorized users; someone gaining complete access to a disk cannot obtain any useful data from the system, and backups can be done without allow ..."
Abstract - Cited by 74 (9 self) - Add to MetaCart
We have developed a scheme to secure networkattached storage systems against many types of attacks. Our system uses strong cryptography to hide data from unauthorized users; someone gaining complete access to a disk cannot obtain any useful data from the system, and backups can be done without

Physical Integrity in a Large Segmented Database

by Raymond A. Lorie - ACM Transactions on Database Systems , 1977
"... A database system can generally be divided into three major components. One component supports the logical database as seen by the user. Another component maps the information into physical records. The third component, called the storage component, is r&ponsible for mapping these records onto a ..."
Abstract - Cited by 95 (4 self) - Add to MetaCart
A database system can generally be divided into three major components. One component supports the logical database as seen by the user. Another component maps the information into physical records. The third component, called the storage component, is r&ponsible for mapping these records onto

Effects of experience on brain development

by Wiuiam T. Greenough, James E. Black, Christopher S. Wallace - Child Development , 1987
"... influence the developing and mature brain and proposes a new categorization scheme based upon the type of information stored and the brain mechanisms that appear to be involved in storing it. In this scheme, experience-expectant infonnation storage refers to incorporation of environmental in-formati ..."
Abstract - Cited by 132 (0 self) - Add to MetaCart
influence the developing and mature brain and proposes a new categorization scheme based upon the type of information stored and the brain mechanisms that appear to be involved in storing it. In this scheme, experience-expectant infonnation storage refers to incorporation of environmental in

Privacy-Preserving Public Auditing for Secure Cloud Storage

by Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren, Wenjing Lou , 2009
"... Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession o ..."
Abstract - Cited by 75 (3 self) - Add to MetaCart
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession
Next 10 →
Results 1 - 10 of 409
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University