Sciweavers

7504 search results - page 321 / 1501
» Computing with Action Potentials
Sort
View
SIGMOD
2008
ACM
117views Database» more  SIGMOD 2008»
15 years 3 months ago
Jim Gray at Berkeley
Jim Gray spent a decade as a student and researcher at Berkeley. In action, he is remembered for his breath, his depth, and his generosity. Categories and Subject Descriptors K.1 ...
Michael A. Harrison
ICC
2007
IEEE
193views Communications» more  ICC 2007»
15 years 10 months ago
A Semantic Context Model for Location-Based Cooperative Mobile Computing
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
Bin Hu, Philip Moore, Hsiai-Hwa Chen
IC
2010
15 years 2 months ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya
INFOCOM
2011
IEEE
14 years 7 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 5 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...