Sciweavers

24188 search results - page 182 / 4838
» Computing on Encrypted Data
Sort
View
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 4 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
GIS
2006
ACM
16 years 4 months ago
Computing longest duration flocks in trajectory data
Moving point object data can be analyzed through the discovery of patterns. We consider the computational efficiency of computing two of the most basic spatio-temporal patterns in...
Joachim Gudmundsson, Marc J. van Kreveld
ICAC
2005
IEEE
15 years 8 months ago
Model-Driven Placement of Compute Tasks and Data in a Networked Utility
An important problem in resource management for networked resource-sharing systems is the simultaneous allocation of multiple resources to an application. Selfoptimizing systems m...
Piyush Shivam, Adriana Iamnitchi, Aydan R. Yumeref...
WWW
2004
ACM
16 years 3 months ago
Outlink estimation for pagerank computation under missing data
The enormity and rapid growth of the web-graph forces quantities such as its pagerank to be computed under missing information consisting of outlinks of pages that have not yet be...
Sreangsu Acharyya, Joydeep Ghosh
MSS
1995
IEEE
148views Hardware» more  MSS 1995»
15 years 6 months ago
Client/Server data Serving for High-Performance Computing
This paper will attempt to examine the industry requirements for shared network data storage and sustained high speed (10’s to 100’s to thousands of megabytes per second) netw...
Chris Wood