Sciweavers

57 search results - page 11 / 12
» An experiment on the effectiveness of creativity enhancing d...
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
CCGRID
2009
IEEE
13 years 10 months ago
Failure-Aware Construction and Reconfiguration of Distributed Virtual Machines for High Availability Computing
In large-scale clusters and computational grids, component failures become norms instead of exceptions. Failure occurrence as well as its impact on system performance and operatio...
Song Fu
IJCAI
2007
13 years 7 months ago
Emergence of Norms through Social Learning
Behavioral norms are key ingredients that allow agent coordination where societal laws do not sufficiently constrain agent behaviors. Whereas social laws need to be enforced in a...
Sandip Sen, Stéphane Airiau
HPCA
2009
IEEE
14 years 6 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
NAR
2006
83views more  NAR 2006»
13 years 6 months ago
KOBAS server: a web-based platform for automated annotation and pathway identification
There is an increasing need to automatically annotate a set of genes or proteins (from genome sequencing, DNA microarray analysis or protein 2D gel experiments) using controlled v...
Jianmin Wu, Xizeng Mao, Tao Cai, Jingchu Luo, Lipi...