Sciweavers

24188 search results - page 259 / 4838
» Computing on Encrypted Data
Sort
View
123
Voted
TDSC
2010
168views more  TDSC 2010»
14 years 10 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou
217
Voted
FPL
2011
Springer
233views Hardware» more  FPL 2011»
14 years 3 months ago
Compact CLEFIA Implementation on FPGAS
In this paper two compact hardware structures for the computation of the CLEFIA encryption algorithm are presented. One structure based on the existing state of the art and a nove...
Paulo Proenca, Ricardo Chaves
126
Voted
CCGRID
2008
IEEE
15 years 10 months ago
Data Management Challenges of Data-Intensive Scientific Workflows
Scientific workflows play an important role in today’s science. Many disciplines rely on workflow technologies to orchestrate the execution of thousands of computational tasks. ...
Ewa Deelman, Ann L. Chervenak
161
Voted
PPOPP
1993
ACM
15 years 7 months ago
Computation Migration: Enhancing Locality for Distributed-Memory Parallel Systems
We describe computation migration,a new technique that is based on compile-time program transformations, for accessing remote data in a distributed-memory parallel system. In cont...
Wilson C. Hsieh, Paul Wang, William E. Weihl
132
Voted
ICAS
2006
IEEE
139views Robotics» more  ICAS 2006»
15 years 9 months ago
Predicting Resource Demand in Dynamic Utility Computing Environments
— We target the problem of predicting resource usage in situations where the modeling data is scarce, non-stationary, or expensive to obtain. This scenario occurs frequently in c...
Artur Andrzejak, Sven Graupner, Stefan Plantikow