We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. From Databases to Exchange Formats

    This chapter addresses the question of how to transform relational database content into exchange formats in order to enable data interoperability...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  2. Process Orchestration: Conceptual Design

    This chapter explains and discusses concepts for the conceptual design and formal verification of process orchestrations, employing notations such as...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  3. kNN Join for Dynamic High-Dimensional Data: A Parallel Approach

    The k nearest neighbor (kNN) join operation is a fundamental task that combines two high-dimensional databases, enabling data points in the User...
    Nimish Ukey, Zhengyi Yang, ... Runze Li in Databases Theory and Applications
    Conference paper 2024
  4. Multi-level Storage Optimization for Intermediate Data in AI Model Training

    As Transformer-based large models become the mainstream of AI training, the development of hardware devices (e.g., GPUs) cannot keep up with the...
    Junfeng Fu, Yang Yang, ... Jie Shao in Databases Theory and Applications
    Conference paper 2024
  5. Take a Close Look at the Optimization of Deep Kernels for Non-parametric Two-Sample Tests

    The maximum mean discrepancy (MMD) test with deep kernel is a powerful method to distinguish whether two samples are drawn from the same...
    Xunye Tian, Feng Liu in Databases Theory and Applications
    Conference paper 2024
  6. Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs

    Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental...
    Zhiyang Tang, **ghao Wang, ... Ying Zhang in Databases Theory and Applications
    Conference paper 2024
  7. Probabilistic Reverse Top-k Query on Probabilistic Data

    Reverse top-k queries have received much attention from research communities. The result of reverse top-k queries is a set of objects, which had the...
    Trieu Minh Nhut Le, **li Cao in Databases Theory and Applications
    Conference paper 2024
  8. Device Characterization for Opportunistic Networks

    When implementing opportunistic networks in real applications, not only connectivity problems need to be addressed, but also device restrictions....
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  9. Simulation Tools for Opportunistic Networks

    In this chapter, we start with an introduction to network simulators and especially to discrete event simulators. We explain how they work and what...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  10. Security in Opportunistic Networks

    Security is of paramount importance in Opportunistic Networks (OppNets) due to its unique characteristics and operational challenges. OppNets are...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  11. Connectivity Technologies for Opportunistic Networks

    This chapter explores the question of how to implement opportunistic networks in practice. The main part of this question considers the connectivity...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  12. Theoretical Models for Opportunistic Networks

    In this chapter, we detail how to use theoretical modeling in opportunistic networks (OppNets) using mathematical and computational methods to...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  13. Data Dissemination in Opportunistic Networks

    Data dissemination is the main research and implementation challenge in opportunistic networks. It addresses the question of how to forward data in a...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  14. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  15. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  16. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  17. Smart Noise Detection for Statistical Disclosure Attacks

    While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic...
    Marc Roßberger, Doğan Kesdoğan in Secure IT Systems
    Conference paper 2024
  18. Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More...
    Giovanni Deligios, Chen-Da Liu-Zhang in Financial Cryptography and Data Security
    Conference paper 2024
  19. To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers

    WhatsApp stickers are a popular hybrid of images and emoticons that can contain user-created content. Stickers are mostly sent for legitimate...
    Samantha Klier, Harald Baier in Secure IT Systems
    Conference paper 2024
  20. On the Correlation Complexity of MPC with Cheater Identification

    Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of...
    Nicholas Brandt, Sven Maier, ... Jörn Müller-Quade in Financial Cryptography and Data Security
    Conference paper 2024
Did you find what you were looking for? Share feedback.