Sciweavers

8655 search results - page 246 / 1731
» Challenges for Trusted Computing
Sort
View
SIGMOD
2012
ACM
276views Database» more  SIGMOD 2012»
13 years 1 months ago
SCARAB: scaling reachability computation on large graphs
Most of the existing reachability indices perform well on small- to medium- size graphs, but reach a scalability bottleneck around one million vertices/edges. As graphs become inc...
Ruoming Jin, Ning Ruan, Saikat Dey, Jeffrey Xu Yu
FCCM
2006
IEEE
101views VLSI» more  FCCM 2006»
15 years 5 months ago
A Type Architecture for Hybrid Micro-Parallel Computers
Recently, platform FPGAs that integrate sequential processors with a spatial fabric have become prevalent. While these hybrid architectures ease the burden of integrating sequenti...
Benjamin Ylvisaker, Brian Van Essen, Carl Ebeling
IACR
2011
97views more  IACR 2011»
13 years 10 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
82
Voted
ISBI
2008
IEEE
15 years 11 months ago
Computer vision tracking of stemness
Clinical translation of stem cell research promises to revolutionize medicine. Challenges remain toward better understanding of stem cell biology and cost-effective strategies for...
Kang Li, Eric D. Miller, Mei Chen, Takeo Kanade, L...
CISIS
2010
IEEE
15 years 6 months ago
Computational Grid as an Appropriate Infrastructure for Ultra Large Scale Software Intensive Systems
—Ultra large scale (ULS) systems are future software intensive systems that have billions of lines of code, composed of heterogeneous, changing, inconsistent and independent elem...
Babak Rezaei Rad, Fereidoon Shams Aliee