Sciweavers

2582 search results - page 106 / 517
» Developing a Data Driven System for Computational Neuroscien...
Sort
View
WSNA
2003
ACM
14 years 3 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
CCS
2009
ACM
14 years 10 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
ICASSP
2011
IEEE
13 years 1 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...
EUROPAR
2007
Springer
14 years 4 months ago
SymGrid: A Framework for Symbolic Computation on the Grid
This paper introduces the design of SymGrid, a new Grid framework that will, for the first time, allow multiple invocations of symbolic computing applications to interact via the ...
Kevin Hammond, Abdallah Al Zain, Gene Cooperman, D...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 5 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...