Sciweavers

1510 search results - page 279 / 302
» The distributed Karhunen-Loeve transform
Sort
View
CCS
2009
ACM
15 years 6 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
EDBT
2009
ACM
218views Database» more  EDBT 2009»
15 years 6 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
ICS
2009
Tsinghua U.
15 years 6 months ago
High-performance CUDA kernel execution on FPGAs
In this work, we propose a new FPGA design flow that combines the CUDA programming model from Nvidia with the state of the art high-level synthesis tool AutoPilot from AutoESL, to...
Alexandros Papakonstantinou, Karthik Gururaj, John...
INFOCOM
2009
IEEE
15 years 5 months ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...