Sciweavers

24529 search results - page 500 / 4906
» Computing on Authenticated Data
Sort
View
CSE
2009
IEEE
15 years 9 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
DAWAK
2006
Springer
15 years 8 months ago
On the Computation of Maximal-Correlated Cuboids Cells
The main idea of iceberg data cubing methods relies on optimization techniques for computing only the cuboids cells above certain minimum support threshold. Even using such approac...
Ronnie Alves, Orlando Belo
SC
2009
ACM
15 years 12 months ago
Exploring many task computing in scientific workflows
One of the main advantages of using a scientific workflow management system (SWfMS) to orchestrate data flows among scientific activities is to control and register the whole work...
Eduardo S. Ogasawara, Daniel de Oliveira, Fernando...
DIALM
1999
ACM
150views Algorithms» more  DIALM 1999»
15 years 9 months ago
Mobile computing in next generation wireless networks
In this paper, we attempt to describe the evolving status of wireless communications and its impact on the future of mobile computing. We present a historical perspective and eluc...
Prathima Agrawal, David Famolari
ISCA
2007
IEEE
217views Hardware» more  ISCA 2007»
15 years 5 months ago
Parallel Processing of High-Dimensional Remote Sensing Images Using Cluster Computer Architectures
Hyperspectral sensors represent the most advanced instruments currently available for remote sensing of the Earth. The high spatial and spectral resolution of the images supplied ...
David Valencia, Antonio Plaza, Pablo Martín...