Sciweavers

2059 search results - page 278 / 412
» New Advances in Reconfigurable Computing and its Application...
Sort
View
ASIACRYPT
2007
Springer
15 years 6 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
15 years 4 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
SNPD
2008
15 years 1 months ago
Effect of Security Increment to Symmetric Data Encryption through AES Methodology
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic ...
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad ...
MIDDLEWARE
2009
Springer
15 years 6 months ago
DR-OSGi: Hardening Distributed Components with Network Volatility Resiliency
Abstract. Because middleware abstractions remove the need for lowlevel network programming, modern distributed component systems expose network volatility (i.e., frequent but inter...
Young-Woo Kwon, Eli Tilevich, Taweesup Apiwattanap...
IPPS
2006
IEEE
15 years 5 months ago
A tool for environment deployment in clusters and light grids
Focused around the field of the exploitation and the administration of high performance large-scale parallel systems , this article describes the work carried out on the deployme...
Yiannis Georgiou, Julien Leduc, Brice Videau, Joha...