Sciweavers

162 search results - page 22 / 33
» Outsourcing Multi-Party Computation
Sort
View
SDMW
2004
Springer
14 years 3 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
CORR
2008
Springer
122views Education» more  CORR 2008»
13 years 9 months ago
From formal proofs to mathematical proofs: a safe, incremental way for building in first-order decision procedures
Abstract We investigate here a new version of the Calculus of Inductive Constructions (CIC) on which the proof assistant Coq is based: the Calculus of Congruent Inductive Construct...
Frédéric Blanqui, Jean-Pierre Jouann...
PVLDB
2008
216views more  PVLDB 2008»
13 years 8 months ago
Ad-hoc data processing in the cloud
Ad-hoc data processing has proven to be a critical paradigm for Internet companies processing large volumes of unstructured data. However, the emergence of cloud-based computing, ...
Dionysios Logothetis, Ken Yocum
GI
2007
Springer
14 years 3 months ago
Mehrrundige Kombinatorische Auktionen beim Innerbetrieblichen Austausch von Logistikdienstleistungen
: Der Austausch von Ladekapazit¨aten in der logistischen Praxis wird oft ¨uber webbasierte Marktpl¨atze vorgenommen. Wenige dieser Transportb¨orsen sind jedoch in der Lage, Syn...
Oleg Gujo, Michael Schwind, Jens Vykoukal, Oliver ...
SAC
2009
ACM
14 years 2 months ago
Fast networking with socket-outsourcing in hosted virtual machine environments
This paper proposes a novel method of achieving fast networking in hosted virtual machine (VM) environments. This method, called socket-outsourcing, replaces the socket layer in a...
Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyu...