Sciweavers

24188 search results - page 156 / 4838
» Computing on Encrypted Data
Sort
View
JPDC
2006
141views more  JPDC 2006»
15 years 3 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
WSDM
2010
ACM
176views Data Mining» more  WSDM 2010»
16 years 15 days ago
Adaptive Weighing Designs for Keyword Value Computation
Georgios Zervas, John W. Byers, Michael Mitzenmach...
KDD
2010
ACM
271views Data Mining» more  KDD 2010»
15 years 1 months ago
Parallel SimRank computation on large graphs with iterative aggregation
Guoming He, Haijun Feng, Cuiping Li, Hong Chen