搜索结果: 1-15 共查到“Query”相关记录87条 . 查询时间(0.167 秒)
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Location privacy Geohashing Spatial cloaking
2019/7/17
Location data is an important piece of contextual information in location-driven features for geosocial and pervasive computing applications. In this paper, we propose to geo-hash locations using spac...
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Encrypted Database Attack Range Query
2019/5/5
Recent foundational work on leakage-based attacks on encrypted databases has broadened our understanding of what an adversary can accomplish with a standard leakage profile. Nevertheless, all known va...
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2018/8/2
Recent works by Kellaris et al. (CCS’16) and Lacharite et al. (SP’18) demonstrated attacks of data recovery for encrypted databases that support rich queries such as range queries. In this paper, we d...
IMPROVING PATH QUERY PERFORMANCE IN PGROUTING USING A MAP GENERALIZATION APPROACH
pgRouting Road Networks Skeletal Model Skeleton Shortest Path Map Generalization Zones Path Computation
2018/11/8
pgRouting library provides functions to compute shortest path between any two points of a road network which is of great demand and also a topic of interest in the field of GIS, graph theory and trans...
ADDING 3D GIS VISUALIZATION AND NAVIGATION TO THE SPARQL QUERY LOOP
3D visualization, geospatial data, Linked Data, SPARQL, REPL, data analytics
2018/11/8
3D environments allow advanced spatial navigation and visualization, but have traditionally provided limited support for performing non-spatial data analysis operations like filtering, joining, and in...
Loamit: A Blockchain-based Residual Loanable-limit Query System
Blockchain loanable-limit bank
2018/7/9
Currently, the blockchain technology is experiencing an exponential growth in the academia and industry. Blockchain may provide the fault-tolerance, tamper-resistance, credibility and privacy to users...
Geosocial Query with User-Controlled Privacy
location privacy homomorphic encryption applications
2018/4/4
Geosocial applications collect (and record) users’ precise location data to perform proximity computations, such as notifying a user or triggering a service when a friend is within geographic proximit...
A New Functional Encryption for Multidimensional Range Query
Functional Encryption Multidimensional Range Query
2017/10/9
Functional encryption, which emerges in the community recently, is a generalized concept of traditional encryption (e.g. RSA and AES). In traditional encryption scheme, decrypting a ciphertext with a ...
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Encrypted database leakage
2017/7/24
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the clie...
GEOYASGUI: THE GEOSPARQL QUERY EDITOR AND RESULT SET VISUALIZER
GeoSPARQL IDE Linked Open Data Open Government Semantic Web
2017/8/10
The Netherlands' Cadastre, Land Registry and Mapping Agency – in short Kadaster – collects and registers administrative and spatial data on property and the rights involved. This includes for ships, a...
Generic text-based compression models are simple and fast but there are two issues that needs to be addressed. They cannot leverage the structure that exists in data to achieve better compression and ...
Authentication of Outsourced Linear Function Query with Efficient Updates
Efficient Updates higher efficiency
2017/4/19
Storing the large-scale data on the cloud server side becomes nowadays an alternative for the data owner with the popularity and maturity of the cloud computing technique, where the data owner can man...
A Query Language for Understanding Component Interactions in Production Systems
Query language logs influence correlation production systems
2016/5/24
When something unexpected happens in a large production system,administrators must first perform a search to isolate which components and component interactions are likely to be involved. The system m...
Generalized Selection via Interactive Query Relaxation
Selection annotation pointing reference information visualization input techniques query relaxation
2016/5/24
Selection is a fundamental task in interactive applications,
typically performed by clicking or lassoing items of
interest. However, users may require more nuanced forms
of selection. Selecting reg...
Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck
probabilistically checkable proofs interactive proofs proof composition
2016/3/24
We study *interactive oracle proofs* (IOPs) (Ben-Sasson, Chiesa, Spooner '16), which combine aspects of probabilistically checkable proofs (PCPs) and interactive proofs (IPs). We present IOP construct...