Sciweavers

712 search results - page 143 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
CCR
2007
119views more  CCR 2007»
13 years 4 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
SIGCSE
2002
ACM
134views Education» more  SIGCSE 2002»
13 years 4 months ago
Internationalization of the curriculum report of a project within computer science
In the Fall of 1999 the Center for Excellence in Undergraduate Teaching (CEUT) and the International Office at Virginia Tech provided a small grant to support the incorporation of...
John A. N. Lee