Sciweavers

739 search results - page 135 / 148
» Security Challenges in Cloud Computing
Sort
View
ICS
2010
Tsinghua U.
15 years 4 months ago
Small-ruleset regular expression matching on GPGPUs: quantitative performance analysis and optimization
We explore the intersection between an emerging class of architectures and a prominent workload: GPGPUs (General-Purpose Graphics Processing Units) and regular expression matching...
Jamin Naghmouchi, Daniele Paolo Scarpazza, Mladen ...
72
Voted
IDA
2010
Springer
15 years 4 months ago
Using CAPTCHAs to Index Cultural Artifacts
: Rock art, human-made markings on stone, is an important cultural and the earliest expression of abstract thinking. While there are tens of millions of photographs of rock art in ...
Qiang Zhu 0002, Eamonn J. Keogh
93
Voted
USS
2008
15 years 2 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
CIIA
2009
15 years 23 days ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
90
Voted
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 11 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta