Sciweavers

5843 search results - page 1168 / 1169
» Software Security in Practice
Sort
View
CIKM
2011
Springer
12 years 5 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
ECCE
2011
12 years 5 months ago
Design of a safe computer-supported cooperative environment in radiotherapy: exploratory identification of cooperation strategie
Motivation – This research deals with the identification of collective production of a safe radiotherapy treatment and its potential assistance through computer-supported enviro...
Maria Isabel Munoz, Vanina Mollo, Flore Barcellini...
PPOPP
2012
ACM
12 years 1 months ago
PARRAY: a unifying array representation for heterogeneous parallelism
This paper introduces a programming interface called PARRAY (or Parallelizing ARRAYs) that supports system-level succinct programming for heterogeneous parallel systems like GPU c...
Yifeng Chen, Xiang Cui, Hong Mei
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
11 years 8 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
11 years 8 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
« Prev « First page 1168 / 1169 Last » Next »