Sciweavers

492 search results - page 58 / 99
» Encrypted Shared Data Spaces
Sort
View
HPDC
2005
IEEE
14 years 3 months ago
Generosity and gluttony in GEMS: grid enabled molecular simulations
Biomolecular simulations produce more output data than can be managed effectively by traditional computing systems. Researchers need distributed systems that allow the pooling of...
Justin M. Wozniak, Paul Brenner, Douglas Thain, Aa...
KDD
2008
ACM
134views Data Mining» more  KDD 2008»
14 years 10 months ago
Privacy-preserving cox regression for survival analysis
Privacy-preserving data mining (PPDM) is an emergent research area that addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper we prop...
Shipeng Yu, Glenn Fung, Rómer Rosales, Srir...
SRDS
2010
IEEE
13 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
AICT
2006
IEEE
201views Communications» more  AICT 2006»
14 years 3 months ago
Distributed Web Service Discovery Architecture
In this paper, we present a distributed Web service discovery architecture that is designed to be reliable, flexible and scalable. The architecture is based on the concept of dis...
Brahmananda Sapkota, Dumitru Roman, Sebastian Rysz...
USENIX
1996
13 years 11 months ago
Transparent Fault Tolerance for Parallel Applications on Networks of Workstations
This paper describes a new method for providingtransparent fault tolerance for parallel applications on a network of workstations. We have designed our method in the context of sh...
Daniel J. Scales, Monica S. Lam