Sciweavers

148 search results - page 20 / 30
» Governmental virtual institutions
Sort
View
ACSAC
1999
IEEE
13 years 11 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
DBSEC
2009
112views Database» more  DBSEC 2009»
13 years 8 months ago
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
There is an increasing need for sharing data repositories containing personal information across multiple distributed and private databases. However, such data sharing is subject t...
Pawel Jurczyk, Li Xiong
CCGRID
2008
IEEE
14 years 1 months ago
Enabling Interoperability among Meta-Schedulers
Grid computing supports shared access to computing resources from cooperating organizations or institutes in the form of virtual organizations. Resource brokering middleware, comm...
Norman Bobroff, Liana Fong, Selim Kalayci, Yanbin ...
HICSS
1996
IEEE
86views Biometrics» more  HICSS 1996»
13 years 11 months ago
Towards a Thread-Based Parallel Direct Execution Simulator
Parallel direct execution simulation is an important tool for performance and scalability analysis of large message passing parallel programs executing on top of a virtual compute...
Phillip M. Dickens, Matthew Haines, Piyush Mehrotr...
EDBT
2008
ACM
144views Database» more  EDBT 2008»
14 years 7 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta