Sciweavers

24188 search results - page 272 / 4838
» Computing on Encrypted Data
Sort
View
ACSW
2007
15 years 5 months ago
DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids
Traditional DHT (Distributed Hash Tables) abstraction distributes data items among peer nodes on a structured overlay network. This introduces a number of issues when nodes are un...
Verdi March, Yong Meng Teo, Xianbing Wang
JAT
2006
64views more  JAT 2006»
15 years 3 months ago
Nonlinear function approximation: Computing smooth solutions with an adaptive greedy algorithm
Opposed to linear schemes, nonlinear function approximation allows to obtain a dimension independent rate of convergence. Unfortunately, in the presence of data noise typical algo...
Andreas Hofinger
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti

Publication
185views
17 years 2 months ago
Computer Networking in the People's Republic of China: A Trip Report
The authors were part of an eighteen-member international delegation of data communications professionals that recently visited the People's Republic of China. This report on ...
R. Jain and R. L. Pickholtz,
PDCAT
2004
Springer
15 years 9 months ago
Locabus: A Kernel to Kernel Communication Channel for Cluster Computing
Abstract. This paper proposes a kernel to kernel communication system for use in cluster computers. It is implemented directly on the Ethernet data link layer. This allows use of E...
Paul Werstein, Mark Pethick, Zhiyi Huang