×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [alice store]
Top-K Query Evaluation on Probabilistic Data Christopher Ré, Nilesh Dalvi and Dan Suciu University of Washington
220 views
Hashing Sandy Kutin CSPP 532 7/10/01. Cryptographic Protocols zWhat is a cryptographic protocol? zExample: Alice sends Bob a message M y1. Alice generates
219 views
Hashing
30 views
Top-K Query Evaluation on Probabilistic Data
38 views