Sciweavers

24529 search results - page 203 / 4906
» Computing on Authenticated Data
Sort
View
124
Voted
BIBE
2006
IEEE
139views Bioinformatics» more  BIBE 2006»
15 years 9 months ago
A Computational Inference Framework for analyzing Gene Regulation Pathway using Microarray Data
Microarray experiments produce gene expression data at such a high speed and volume that it is imperative to use highly specialized computational tools for their analyses. One grou...
Dong-Guk Shin, John Bluis, Yoo Ah Kim, Winfried Kr...
99
Voted
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
15 years 8 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...
CCS
2010
ACM
15 years 7 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
DEXAW
2005
IEEE
138views Database» more  DEXAW 2005»
15 years 9 months ago
Towards a Better Integration of Data Mining and Decision Support via Computational Intelligence
Despite a high level of activity and a large number of researchers involved, current research in data mining is plagued with several serious problems that should be regarded as to...
Sylvain Delisle
LCR
1998
Springer
150views System Software» more  LCR 1998»
15 years 7 months ago
Improving Locality in Out-of-Core Computations Using Data Layout Transformations
Programs accessing disk-resident arrays, called out-of-core programs, perform poorly in general due to an excessive number of I/O calls and insufficient help from compilers. In ord...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...