Sciweavers

24529 search results - page 264 / 4906
» Computing on Authenticated Data
Sort
View
74
Voted
COMPUTER
1999
65views more  COMPUTER 1999»
15 years 3 months ago
Extending NASA's Data Processing to Spacecraft
Marco A. Figueiredo, Patrick H. Stakem, Thomas P. ...
203
Voted
COMPUTING
2011
14 years 10 months ago
Cloud computing for small research groups in computational science and engineering: current status and outlook
Abstract Cloud computing could offer good business models for small CSE (Computational Science and Engineering) research groups because these groups often do not have enough human ...
Hong Linh Truong, Schahram Dustdar
168
Voted
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
117
Voted
CHI
2006
ACM
16 years 4 months ago
Support for activity-based computing in a personal computing operating system
Research has shown that computers are notoriously bad at supporting the management of parallel activities and interruptions, and that mobility increases the severity and scope of ...
Jakob E. Bardram, Jonathan Bunde-Pedersen, Mads S&...
COMPUTER
2007
44views more  COMPUTER 2007»
15 years 3 months ago
Privacy-Preserving Data Mining Systems
Nan Zhang 0004, Wei Zhao