Sciweavers

24529 search results - page 429 / 4906
» Computing on Authenticated Data
Sort
View
FOCS
1997
IEEE
15 years 9 months ago
Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval
d abstract) Eyal Kushilevitz Rafail Ostrovskyy Technion Bellcore We establish the following, quite unexpected, result: replication of data for the computational Private Informatio...
Eyal Kushilevitz, Rafail Ostrovsky
EUSFLAT
2007
183views Fuzzy Logic» more  EUSFLAT 2007»
15 years 6 months ago
Soft Computing in Wireless Sensors Networks
The embedded soft computing approach in wireless sensor networks is suggested. This approach means a combination of embedded fuzzy logic and neural networks models for information...
Alexey N. Averkin, A. G. Belenki
BMCBI
2008
99views more  BMCBI 2008»
15 years 4 months ago
Towards a lightweight generic computational grid framework for biological research
Background: An increasing number of scientific research projects require access to large-scale computational resources. This is particularly true in the biological field, whether ...
Mark D. Halling-Brown, David S. Moss, Adrian J. Sh...
TCS
2002
15 years 4 months ago
Unsupervised learning in neural computation
In this article, we consider unsupervised learning from the point of view of applying neural computation on signal and data analysis problems. The article is an introductory surve...
Erkki Oja
CLUSTER
2010
IEEE
14 years 8 months ago
Middleware support for many-task computing
Many-task computing aims to bridge the gap between two computing paradigms, high throughput computing and high performance computing. Many-task computing denotes highperformance co...
Ioan Raicu, Ian T. Foster, Mike Wilde, Zhao Zhang,...