Sciweavers

318 search results - page 42 / 64
» Enforcing Trust in Pervasive Computing with Trusted Computin...
Sort
View
PET
2009
Springer
14 years 3 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
WETICE
2009
IEEE
14 years 3 months ago
Smart Metering the Clouds
— As cloud computing becomes increasingly pervasive, the data center energy consumption attributable to cloud computing is climbing, despite the clarion call of action to reduce ...
Tarry Singh, Pavan Kuman Vara
SAC
2008
ACM
13 years 8 months ago
Contextualizing normative open multi-agent systems
Open MASs can be extremely dynamic due to heterogeneous agents that migrate among them to obtain resources or services not found locally. In order to prevent malicious actions and...
Carolina Howard Felicíssimo, Caroline Chopi...
SIGMOD
2009
ACM
190views Database» more  SIGMOD 2009»
14 years 9 months ago
Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason
We are experiencing a new Social Web, where people share, communicate, commiserate, and conflict with each other. As evidenced by systems like Wikipedia, twitter, and delicious.co...
Ed H. Chi
AISC
1998
Springer
14 years 1 months ago
Reasoning About Coding Theory: The Benefits We Get from Computer Algebra
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
Clemens Ballarin, Lawrence C. Paulson