Sciweavers

24188 search results - page 228 / 4838
» Computing on Encrypted Data
Sort
View
99
Voted
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Oblivious RAM Revisited
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client, that can store locally only a constant amount of data, to store remotely ...
Benny Pinkas, Tzachy Reinman
123
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Developing a Cloud Computing Charging Model for High-Performance Computing Resources
Abstract—This paper examines the economics of cloud computing charging from the perspective of a supercomputing resource provider offering its own resources. To evaluate the comp...
Matthew Woitaszek, Henry M. Tufo
122
Voted
INCDM
2009
Springer
131views Data Mining» more  INCDM 2009»
15 years 10 months ago
Computer-Aided Diagnosis in Brain Computed Tomography Screening
Currently, interpretation of medical images is almost exclusively made by specialized physicians. Although, the next decades will most certainly be of change and computer-aided dia...
Hugo Peixoto, Victor Alves
DEXAW
2009
IEEE
124views Database» more  DEXAW 2009»
15 years 10 months ago
Performance Comparison of Secure Comparison Protocols
Secure Multiparty Computation (SMC) has gained tremendous importance with the growth of the Internet and E-commerce, where mutually untrusted parties need to jointly compute a fun...
Florian Kerschbaum, Debmalya Biswas, Sebastiaan de...
120
Voted
EUROMICRO
1997
IEEE
15 years 7 months ago
What computer architecture can learn from computational intelligence-and vice versa
This paper considers whether the seemingly disparate fields of Computational Intelligence (CI) and computer architecture can profit from each others’ principles, results and e...
Ronald Moore, Bernd Klauer, Klaus Waldschmidt