-
1
-
-
0346803832
-
A simple parallel tree contraction algorithm
-
K. Abrahamson, N. Dadoun, D. G. Kirkpatrick, and T. Przytycka. A simple parallel tree contraction algorithm. J. Algorithms, 10:287-302, 1989.
-
(1989)
J. Algorithms
, vol.10
, pp. 287-302
-
-
Abrahamson, K.1
Dadoun, N.2
Kirkpatrick, D.G.3
Przytycka, T.4
-
5
-
-
52449146186
-
Parallel algorithms for some functions of two convex polygons
-
M. J. Atallah and M. T. Goodrich. Parallel algorithms for some functions of two convex polygons. Algorithmica, 3:535-548, 1988.
-
(1988)
Algorithmica
, vol.3
, pp. 535-548
-
-
Atallah, M.J.1
Goodrich, M.T.2
-
7
-
-
70349266254
-
FairplayMP: A system for secure multi-party computation
-
New York, NY, USA ACM
-
A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP: A system for secure multi-party computation. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 257-266, New York, NY, USA, 2008. ACM.
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
8
-
-
33745304177
-
Nearest and reverse nearest neighbor queries for moving objects
-
R. Benetis, S. Jensen, G. Karc̊iauskas, and S. S̊altenis. Nearest and reverse nearest neighbor queries for moving objects. The VLDB Journal, 15(3):229-249, 2006.
-
(2006)
The VLDB Journal
, vol.15
, Issue.3
, pp. 229-249
-
-
Benetis, R.1
Jensen, S.2
Karc̊iauskas, G.3
S̊altenis, S.4
-
9
-
-
0000099361
-
Optimal doubly logarithmic parallel algorithms based on finding all nearest smaller values
-
O. Berkman, B. Schieber, and U. Vishkin. Optimal doubly logarithmic parallel algorithms based on finding all nearest smaller values. J. Algorithms, 14(3):344-370, 1993.
-
(1993)
J. Algorithms
, vol.14
, Issue.3
, pp. 344-370
-
-
Berkman, O.1
Schieber, B.2
Vishkin, U.3
-
10
-
-
0033259379
-
Parallel construction of quadtrees and quality triangulations
-
M. Bern, D. Eppstein, and S.-H. Teng. Parallel construction of quadtrees and quality triangulations. Internat. J. Comput. Geom. Appl., 9(6):517-532, 1999.
-
(1999)
Internat. J. Comput. Geom. Appl.
, vol.9
, Issue.6
, pp. 517-532
-
-
Bern, M.1
Eppstein, D.2
Teng, S.-H.3
-
11
-
-
78649833238
-
Privacy-preserving techniques for location-based services
-
E. Bertino. Privacy-preserving techniques for location-based services. SIGSPATIAL Special, 1(2):2-3, 2009.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 2-3
-
-
Bertino, E.1
-
12
-
-
70349107532
-
Security and privacy for geospatial data: Concepts and research directions
-
E. Bertino, B. Thuraisingham, M. Gertz, and M. L. Damiani. Security and privacy for geospatial data: concepts and research directions. In Proc. ACM Int. Workshop on Security and Privacy in GIS and LBS (SPRINGL), pages 6-19, 2008.
-
(2008)
Proc. ACM Int. Workshop on Security and Privacy in GIS and LBS (SPRINGL)
, pp. 6-19
-
-
Bertino, E.1
Thuraisingham, B.2
Gertz, M.3
Damiani, M.L.4
-
13
-
-
74049153767
-
Finding long and similar parts of trajectories
-
New York, NY, USA ACM
-
K. Buchin, M. Buchin, M. van Kreveld, and J. Luo. Finding long and similar parts of trajectories. In GIS '09: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pages 296-305, New York, NY, USA, 2009. ACM.
-
(2009)
GIS '09: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
, pp. 296-305
-
-
Buchin, K.1
Buchin, M.2
Van Kreveld, M.3
Luo, J.4
-
14
-
-
0029239056
-
A decomposition of multidimensional point sets with applications to k-nearest-neighbors and n-body potential fields
-
P. B. Callahan and S. R. Kosaraju. A decomposition of multidimensional point sets with applications to k-nearest-neighbors and n-body potential fields. J. ACM, 42:67-90, 1995.
-
(1995)
J. ACM
, vol.42
, pp. 67-90
-
-
Callahan, P.B.1
Kosaraju, S.R.2
-
15
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
New York, NY, USA ACM
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party and multi-party secure computation. In STOC '02: Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pages 494-503, New York, NY, USA, 2002. ACM.
-
(2002)
STOC '02: Proceedings of the Thiry-fourth Annual ACM Symposium on Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
16
-
-
47149102713
-
Well-separated pair decomposition in linear time?
-
T. M. Chan. Well-separated pair decomposition in linear time? Inf. Process. Lett., 107(5):138-141, 2008.
-
(2008)
Inf. Process. Lett.
, vol.107
, Issue.5
, pp. 138-141
-
-
Chan, T.M.1
-
17
-
-
78650620182
-
Privacy in location-based services: A system architecture perspective
-
C.-Y. Chow and M. F. Mokbel. Privacy in location-based services: a system architecture perspective. SIGSPATIAL Special, 1(2):23-27, 2009.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 23-27
-
-
Chow, C.-Y.1
Mokbel, M.F.2
-
18
-
-
77954027214
-
Deterministic coin tossing with applications to optimal list ranking
-
R. Cole and U. Vishkin. Deterministic coin tossing with applications to optimal list ranking. Inform. Control, 1:153-174, 1986.
-
(1986)
Inform. Control
, vol.1
, pp. 153-174
-
-
Cole, R.1
Vishkin, U.2
-
19
-
-
0003772933
-
-
Springer-Verlag, Berlin
-
M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Computational Geometry: Algorithms and Applications. Springer-Verlag, Berlin, 1997.
-
(1997)
Computational Geometry: Algorithms and Applications
-
-
De Berg, M.1
Van Kreveld, M.2
Overmars, M.3
Schwarzkopf, O.4
-
20
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: a review and open problems. In 2001 Workshop on New Security Paradigms, pages 13-22, 2001.
-
(2001)
2001 Workshop on New Security Paradigms
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
21
-
-
0242612156
-
A practical approach to solve secure multi-party computation problems
-
New York, NY, USA ACM
-
W. Du and Z. Zhan. A practical approach to solve secure multi-party computation problems. In NSPW '02: Proceedings of the 2002 workshop on New security paradigms, pages 127-135, New York, NY, USA, 2002. ACM.
-
(2002)
NSPW '02: Proceedings of the 2002 Workshop on New Security Paradigms
, pp. 127-135
-
-
Du, W.1
Zhan, Z.2
-
23
-
-
78650598776
-
Privacy in location-aware systems
-
J.-C. Freytag. Privacy in location-aware systems. SIGSPATIAL Special, 1(2):4-8, 2009.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 4-8
-
-
Freytag, J.-C.1
-
24
-
-
3042622967
-
A local nearest-neighbor convex-hull construction of home ranges and utilization distributions
-
W. M. Getz and C. Wilmers. A local nearest-neighbor convex-hull construction of home ranges and utilization distributions. Ecography, 27(4):489-505, 2004.
-
(2004)
Ecography
, vol.27
, Issue.4
, pp. 489-505
-
-
Getz, W.M.1
Wilmers, C.2
-
25
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 43(3):431-473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
27
-
-
70349694737
-
On privacy preserving convex hull
-
Los Alamitos, CA, USA IEEE Computer Society
-
S. Hans, S. C. Addepalli, A. Gupta, and K. Srinathan. On privacy preserving convex hull. In Int. Conf. on Availability, Reliability and Security, pages 187-192, Los Alamitos, CA, USA, 2009. IEEE Computer Society.
-
(2009)
Int. Conf. on Availability, Reliability and Security
, pp. 187-192
-
-
Hans, S.1
Addepalli, S.C.2
Gupta, A.3
Srinathan, K.4
-
28
-
-
70449721722
-
Dual-heap kNN: K-nearest neighbor search for spatial data retrieval in embedded DBMS
-
New York, NY, USA ACM
-
H. Hayashi, D. Ito, M. Tanizaki, K. Kimura, and H. Kajiyama. Dual-heap kNN: k-nearest neighbor search for spatial data retrieval in embedded DBMS. In GIS '08: Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, pages 1-10, New York, NY, USA, 2008. ACM.
-
(2008)
GIS '08: Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
, pp. 1-10
-
-
Hayashi, H.1
Ito, D.2
Tanizaki, M.3
Kimura, K.4
Kajiyama, H.5
-
29
-
-
70449731025
-
Approaches for determining the geographic footprint of arbitrary terms for retrieval and visualization
-
New York, NY, USA ACM
-
A. Henrich, V. Lüdecke, and D. Blank. Approaches for determining the geographic footprint of arbitrary terms for retrieval and visualization. In GIS '08: Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, pages 1-4, New York, NY, USA, 2008. ACM.
-
(2008)
GIS '08: Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
, pp. 1-4
-
-
Henrich, A.1
Lüdecke, V.2
Blank, D.3
-
30
-
-
77955907997
-
Privacy for real-time location-based services
-
L. Kulik. Privacy for real-time location-based services. SIGSPATIAL Special, 1(2):9-14, 2009.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 9-14
-
-
Kulik, L.1
-
31
-
-
62749140824
-
A practical three-dimensional privacy-preserving approximate convex hulls protocol
-
Washington, DC, USA IEEE Computer Society
-
D. Li, L. Huang, W. Yang, Y. Zhu, Y. Luo, Z. Chen, L. Li, and Y. Ye. A practical three-dimensional privacy-preserving approximate convex hulls protocol. In FCST '08: Proceedings of the 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, pages 17-23, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
FCST '08: Proceedings of the 2008 Japan-china Joint Workshop on Frontier of Computer Science and Technology
, pp. 17-23
-
-
Li, D.1
Huang, L.2
Yang, W.3
Zhu, Y.4
Luo, Y.5
Chen, Z.6
Li, L.7
Ye, Y.8
-
33
-
-
74049111211
-
Analysis of wireless localization using non-line-of-sight radio signals
-
New York, NY, USA ACM
-
D. Liu and M.-C. Lee. Analysis of wireless localization using non-line-of-sight radio signals. In GIS '09: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pages 412-415, New York, NY, USA, 2009. ACM.
-
(2009)
GIS '09: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
, pp. 412-415
-
-
Liu, D.1
Lee, M.-C.2
-
34
-
-
78650615555
-
Privacy and location anonymization in location-based services
-
L. Liu. Privacy and location anonymization in location-based services. SIGSPATIAL Special, 1(2):15-22, 2009.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 15-22
-
-
Liu, L.1
-
35
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Berkeley, CA, USA USENIX Association
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 20-20, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 20-20
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
36
-
-
29244457240
-
Secure multi-party computation made simple
-
U. Maurer. Secure multi-party computation made simple. Discrete Appl. Math., 154(2):370-381, 2006.
-
(2006)
Discrete Appl. Math.
, vol.154
, Issue.2
, pp. 370-381
-
-
Maurer, U.1
-
40
-
-
70449704752
-
Mobile continuous nearest neighbor queries on air
-
New York, NY, USA ACM
-
K. Park, P. Valduriez, and H. Choo. Mobile continuous nearest neighbor queries on air. In GIS '08: Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, pages 1-4, New York, NY, USA, 2008. ACM.
-
(2008)
GIS '08: Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
, pp. 1-4
-
-
Park, K.1
Valduriez, P.2
Choo, H.3
-
42
-
-
0013277969
-
List ranking and parallel tree contraction
-
J. H. Reif, editor Morgan Kaufmann Publishers, Inc., San Mateo, CA
-
M. Reid-Miller, G. L. Miller, and F. Modugno. List ranking and parallel tree contraction. In J. H. Reif, editor, Synthesis of Parallel Algorithms, pages 115-194. Morgan Kaufmann Publishers, Inc., San Mateo, CA, 1993.
-
(1993)
Synthesis of Parallel Algorithms
, pp. 115-194
-
-
Reid-Miller, M.1
Miller, G.L.2
Modugno, F.3
-
43
-
-
84976703615
-
Nearest neighbor queries
-
New York, NY, USA ACM
-
N. Roussopoulos, S. Kelley, and F. Vincent. Nearest neighbor queries. In SIGMOD '95: Proceedings of the 1995 ACM SIGMOD international conference on Management of data, pages 71-79, New York, NY, USA, 1995. ACM.
-
(1995)
SIGMOD '95: Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data
, pp. 71-79
-
-
Roussopoulos, N.1
Kelley, S.2
Vincent, F.3
-
44
-
-
0004022620
-
-
Addison-Wesley, Reading, MA
-
H. Samet. Spatial Data Structures: Quadtrees, Octrees, and Other Hierarchical Methods. Addison-Wesley, Reading, MA, 1989.
-
(1989)
Spatial Data Structures: Quadtrees, Octrees, and Other Hierarchical Methods
-
-
Samet, H.1
-
46
-
-
33645515864
-
Voronoi diagram and convex hull based geocasting and routing in wireless networks
-
I. Stojmenovic, A. P. Ruhil, and D. K. Lobiyal. Voronoi diagram and convex hull based geocasting and routing in wireless networks. Wirel. Commun. Mob. Comput., 6(2):247-258, 2006.
-
(2006)
Wirel. Commun. Mob. Comput.
, vol.6
, Issue.2
, pp. 247-258
-
-
Stojmenovic, I.1
Ruhil, A.P.2
Lobiyal, D.K.3
-
47
-
-
0000662711
-
An O(n log n) algorithm for the all-nearest-neighbors problem
-
P. M. Vaidya. An O(n log n) algorithm for the all-nearest-neighbors problem. Discrete Comput. Geom., 4:101-115, 1989.
-
(1989)
Discrete Comput. Geom.
, vol.4
, pp. 101-115
-
-
Vaidya, P.M.1
-
48
-
-
77954519783
-
Bureaucratic protocols for secure two-party sorting, selection, and permuting
-
ACM
-
G. Wang, T. Luo, M. T. Goodrich, W. Du, and Z. Zhu. Bureaucratic protocols for secure two-party sorting, selection, and permuting. In 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pages 226-237. ACM, 2010.
-
(2010)
5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 226-237
-
-
Wang, G.1
Luo, T.2
Goodrich, M.T.3
Du, W.4
Zhu, Z.5
-
49
-
-
49049100722
-
Privacy-preserving protocols for finding the convex hulls
-
Washington, DC, USA IEEE Computer Society
-
Q. Wang, Y. Luo, and L. Huang. Privacy-preserving protocols for finding the convex hulls. In ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, pages 727-732, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
, pp. 727-732
-
-
Wang, Q.1
Luo, Y.2
Huang, L.3
-
50
-
-
69749107345
-
A convex hull algorithm for planar point set based on privacy protecting
-
Q. Wang and Y. Zhang. A convex hull algorithm for planar point set based on privacy protecting. In Int. Workshop on Educ. Tech. and Comp. Sci., pages 434-437, 2009.
-
(2009)
Int. Workshop on Educ. Tech. and Comp. Sci.
, pp. 434-437
-
-
Wang, Q.1
Zhang, Y.2
|