Sciweavers

24529 search results - page 198 / 4906
» Computing on Authenticated Data
Sort
View
EUC
2005
Springer
15 years 8 months ago
Ubiquitous Computing: Challenges in Flexible Data Aggregation
Abstract. A dramatic increase of event monitoring capabilities by wireless sensors requires new, more sophisticated, event correlation over time and space. This new paradigm implie...
Eiko Yoneki, Jean Bacon
IJIIDS
2008
95views more  IJIIDS 2008»
15 years 3 months ago
Tightly-coupled GIS data in GNSS fix computations with integrity testing
: Global Navigation Satellite Systems (GNSS) are often used to localise a receiver with respect to a given map. This association problem, also known as map-matching, is usually add...
Clément Fouque, Philippe Bonnifait
MICRO
2000
IEEE
107views Hardware» more  MICRO 2000»
15 years 3 months ago
An integrated approach to accelerate data and predicate computations in hyperblocks
To exploit increased instruction-level parallelism available in modern processors, we describe the formation and optimization of tracenets, an integrated approach to reducing the ...
Alexandre E. Eichenberger, Waleed Meleis, Suman Ma...
141
Voted
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 4 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny