Sciweavers

1815 search results - page 146 / 363
» Cloud Computing: An Overview
Sort
View
IACR
2011
158views more  IACR 2011»
13 years 9 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
TAMC
2009
Springer
15 years 4 months ago
Best-Order Streaming Model
We study a new model of computation called stream checking on graph problems where a space-limited verifier has to verify a proof sequentially (i.e., it reads the proof as a strea...
Atish Das Sarma, Richard J. Lipton, Danupon Nanong...
NSDI
2010
14 years 11 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
ECOWS
2010
Springer
14 years 8 months ago
Shepherd: node monitors for fault-tolerant distributed process execution in OSIRIS
OSIRIS is a middleware for the composition and orchestration of distributed web services that follows a P2P decentralized approach to process execution, providing already some deg...
Diego Milano, Nenad Stojnic

Book
324views
16 years 9 months ago
Principles of Computerized Tomographic Imaging
"The purpose of this book is to provide a tutorial overview on the subject of computerized tomographic imaging. We expect the book to be useful for practicing engineers and sc...
Avinash C. Kak , Malcolm Slaney