Sciweavers

34181 search results - page 179 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
JCS
2010
112views more  JCS 2010»
14 years 8 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
86
Voted
ICDCS
2011
IEEE
13 years 9 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
164
Voted
SIGMOD
2009
ACM
140views Database» more  SIGMOD 2009»
15 years 10 months ago
Distributed data-parallel computing using a high-level programming language
The Dryad and DryadLINQ systems offer a new programming model for large scale data-parallel computing. They generalize previous execution environments such as SQL and MapReduce in...
Michael Isard, Yuan Yu
90
Voted
CLUSTER
2009
IEEE
15 years 5 months ago
Topics on measuring real power usage on high performance computing platforms
—Power has recently been recognized as one of the major obstacles in fielding a Peta-FLOPs class system. To reach Exa-FLOPs, the challenge will certainly be compounded. In this ...
James H. Laros, Kevin T. Pedretti, Suzanne M. Kell...
89
Voted
NDSS
2009
IEEE
15 years 5 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...