Sciweavers

5722 search results - page 228 / 1145
» Security Function Interactions
Sort
View
PET
2010
Springer
15 years 7 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
BMCBI
2010
193views more  BMCBI 2010»
15 years 3 months ago
caGrid Workflow Toolkit: A Taverna based workflow tool for cancer Grid
Background: In biological and medical domain, the use of web services made the data and computation functionality accessible in a unified manner, which helped automate the data pi...
Wei Tan, Ravi K. Madduri, Aleksandra Nenadic, Stia...
CORR
2006
Springer
169views Education» more  CORR 2006»
15 years 3 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
133
Voted
PROMS
2001
Springer
92views Multimedia» more  PROMS 2001»
15 years 7 months ago
Providing VCR Functionality in Staggered Video Broadcasting
A true video-on-demand(TVOD) system lets users view any video program, at any time, and perform any VCR functions, but its peruser video delivery cost is too expensive. A near vide...
Jin B. Kwon, Heon Young Yeom
ICFP
2009
ACM
16 years 3 months ago
A functional I/O system or, fun for freshman kids
Functional programming languages ought to play a central role in mathematics education for middle schools (age range: 10?14). After all, functional programming is a form of algebr...
Matthias Felleisen, Robert Bruce Findler, Matthew ...