Sciweavers

24529 search results - page 206 / 4906
» Computing on Authenticated Data
Sort
View
PODS
2006
ACM
95views Database» more  PODS 2006»
16 years 3 months ago
Randomized computations on large data sets: tight lower bounds
We study the randomized version of a computation model (introduced in [9, 10]) that restricts random access to external memory and internal memory space. Essentially, this model c...
André Hernich, Martin Grohe, Nicole Schweik...
147
Voted
DNIS
2010
Springer
184views Database» more  DNIS 2010»
15 years 9 months ago
A Study on Workload Imbalance Issues in Data Intensive Distributed Computing
In recent years, several frameworks have been developed for processing very large quantities of data on large clusters of commodity PCs. These frameworks have focused on fault-tole...
Sven Groot, Kazuo Goda, Masaru Kitsuregawa
ASIACRYPT
2008
Springer
15 years 5 months ago
Towards Robust Computation on Encrypted Data
Encryption schemes that support computation on encrypted data are useful in constructing efficient and intuitively simple cryptographic protocols. However, the approach was previo...
Manoj Prabhakaran, Mike Rosulek
89
Voted
COLING
1992
15 years 4 months ago
Data Types In Computational Phonology
This paper exanfines certain aspects of phonological structure from the viewpoint of ahstract data types, Our imnlediate goal is to find a format for l)honological representation ...
Ewan Klein
117
Voted
SAINT
2003
IEEE
15 years 8 months ago
Data Storage Requirements for the Service Oriented Computing
Service oriented computing and peer-to-peer (P2P) computing are emerging technologies which provide, from the architectural point of view, scalability and flexibility. From their...
Thomas Risse, Predrag Knezevic