Sciweavers

24529 search results - page 176 / 4906
» Computing on Authenticated Data
Sort
View
CACM
2010
117views more  CACM 2010»
15 years 3 months ago
Computing arbitrary functions of encrypted data
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorph...
Craig Gentry
DEXAW
2002
IEEE
127views Database» more  DEXAW 2002»
15 years 8 months ago
Enhanced Multi-Version Data Broadcast Schemes for Time-Constrained Mobile Computing Systems
In this paper, we study the data dissemination problem in time-constrained mobile computing systems (TCMCS) in which maximizing data currency (minimizing staleness) and meeting tr...
Hei-Wing Leung, Joe Chun-Hung Yuen, Kam-yiu Lam, E...
ISMB
1997
15 years 4 months ago
RIBOWEB: Linking Structural Computations to a Knowledge Base of Published Experimental Data
The world wide web(WWW)has becomecritical for storing and disseminatingbiological data. It offers an additional opportunity, however,to support distributed computation and sharing...
Richard O. Chen, Ramon M. Felciano, Russ B. Altman
CIE
2005
Springer
15 years 8 months ago
Towards Computability of Higher Type Continuous Data
Abstract. This paper extends the logical approach to computable analysis via Σ–definability to higher type continuous data such as functionals and operators. We employ definab...
Margarita V. Korovina, Oleg V. Kudinov
IPPS
2000
IEEE
15 years 7 months ago
ACDS: Adapting Computational Data Streams for High Performance
Data-intensive, interactive applications are an important class of metacomputing (Grid) applications. They are characterized by large, time-varying data flows between data provid...
Carsten Isert, Karsten Schwan