Sciweavers

23436 search results - page 4657 / 4688
» Architecture
Sort
View
USS
2010
14 years 7 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
WEBI
2010
Springer
14 years 7 months ago
Lightweight Clustering Methods for Webspam Demotion
Abstract--To make sure they can quickly respond to a specific query, the main search engines have several mechanisms. One of them consists in ranking web pages according to their i...
Thomas Largillier, Sylvain Peyronnet
ACMACE
2009
ACM
14 years 7 months ago
Dramaturgies of PLACE: evaluation, embodiment and performance in PLACE-Hampi
This paper examines an extensive user evaluation survey undertaken during an installation of PLACE-Hampi, a custombuilt augmented stereoscopic panoramic interactive cultural herit...
Sarah Kenderdine, Jeffrey Shaw, Anita Kocsis
AFRICACRYPT
2009
Springer
14 years 7 months ago
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-ke...
Owen Harrison, John Waldron
ANCS
2009
ACM
14 years 7 months ago
An adaptive hash-based multilayer scheduler for L7-filter on a highly threaded hierarchical multi-core server
Ubiquitous multi-core-based web servers and edge routers are increasingly popular in deploying computationally intensive Deep Packet Inspection (DPI) programs. Previous work has s...
Danhua Guo, Guangdeng Liao, Laxmi N. Bhuyan, Bin L...
« Prev « First page 4657 / 4688 Last » Next »