Sciweavers

6195 search results - page 108 / 1239
» Cloud Computing Security
Sort
View
COMPGEOM
2009
ACM
15 years 10 months ago
Integral estimation from point cloud in d-dimensional space: a geometric view
Integration over a domain, such as a Euclidean space or a Riemannian manifold, is a fundamental problem across scientific fields. Many times, the underlying domain is only acces...
Chuanjiang Luo, Jian Sun, Yusu Wang
134
Voted
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
15 years 8 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang
LREC
2010
180views Education» more  LREC 2010»
15 years 5 months ago
Collecting Voices from the Cloud
The collection and transcription of speech data is typically an expensive and time-consuming task. Voice over IP and cloud computing are poised to greatly reduce this impediment t...
Ian McGraw, Chia-ying Lee, I. Lee Hetherington, St...
SEC
1993
15 years 5 months ago
Teaching Computer Security
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
SCN
2008
Springer
142views Communications» more  SCN 2008»
15 years 3 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart