Sciweavers

6195 search results - page 118 / 1239
» Cloud Computing Security
Sort
View
WSKS
2009
Springer
15 years 10 months ago
Towards an "Intelligent" Tagging Tool for Blogs
Tagging allows people to effectively organize web resources such as images, bookmarks or blog articles. Things are found easier by browsing tag clouds relying on the tags that hav...
Juraj Frank, Renate Motschnig, Martin Homola
EUROSYS
2010
ACM
15 years 10 months ago
XCPU3: Workload Distribution and Aggregation
The mainstream adoption of cluster, grid, and most recently cloud computing models have broadened the applicability of parallel programming from scientific communities to the bus...
Pravin Shinde, Eric Van Hensbergen
IEEECIT
2010
IEEE
15 years 2 months ago
Scaling the iHMM: Parallelization versus Hadoop
—This paper compares parallel and distributed implementations of an iterative, Gibbs sampling, machine learning algorithm. Distributed implementations run under Hadoop on facilit...
Sebastien Bratieres, Jurgen Van Gael, Andreas Vlac...
EUROCRYPT
2007
Springer
15 years 7 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
PODC
2010
ACM
15 years 7 months ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer