Sciweavers

2013 search results - page 401 / 403
» Happy New Year
Sort
View
IACR
2011
158views more  IACR 2011»
13 years 9 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
EDBT
2012
ACM
257views Database» more  EDBT 2012»
12 years 12 months ago
Indexing and mining topological patterns for drug discovery
Increased availability of large repositories of chemical compounds has created new challenges and opportunities for the application of data-mining and indexing techniques to probl...
Sayan Ranu, Ambuj K. Singh
IJHPCA
2011
201views more  IJHPCA 2011»
14 years 4 months ago
The International Exascale Software Project roadmap
  Over the last twenty years, the open source community has provided more and more software on which the world’s High Performance Computing (HPC) systems depend for performance ...
Jack Dongarra, Peter H. Beckman, Terry Moore, Patr...
EUROSYS
2006
ACM
15 years 6 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
MOBICOM
2004
ACM
15 years 2 months ago
The changing usage of a mature campus-wide wireless network
Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to und...
Tristan Henderson, David Kotz, Ilya Abyzov