Sciweavers

741 search results - page 97 / 149
» Abstract Machines for Communication Security
Sort
View
CCS
2010
ACM
13 years 10 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
OOPSLA
2010
Springer
13 years 8 months ago
Back to the futures: incremental parallelization of existing sequential runtime systems
Many language implementations, particularly for high-level and scripting languages, are based on carefully honed runtime systems that have an internally sequential execution model...
James Swaine, Kevin Tew, Peter A. Dinda, Robert Br...
PAISI
2010
Springer
13 years 8 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
BIOSURVEILLANCE
2007
Springer
14 years 4 months ago
Global Foot-and-Mouth Disease Surveillance Using BioPortal
Abstract. The paper presents a description of the FMD BioPortal biosurveillance system (http://fmd.ucdavis.edu/bioportal/) that is currently operating to capture, analyze, and diss...
Mark Thurmond, Andrés Perez, Chunju Tseng, ...
ASIACRYPT
2005
Springer
14 years 3 months ago
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes
Abstract. As an extension of multi-party computation (MPC), we propose the concept of secure parallel multi-party computation which is to securely compute multi-functions against a...
Zhifang Zhang, Mulan Liu, Liangliang Xiao