Sciweavers

392 search results - page 10 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
NDSS
2009
IEEE
14 years 5 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 5 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
ICDE
2010
IEEE
195views Database» more  ICDE 2010»
13 years 10 months ago
Statistics-driven workload modeling for the Cloud
— A recent trend for data-intensive computations is to use pay-as-you-go execution environments that scale transparently to the user. However, providers of such environments must...
Archana Ganapathi, Yanpei Chen, Armando Fox, Randy...
CAD
2005
Springer
13 years 10 months ago
Drawing curves onto a cloud of points for point-based modelling
Point-based geometric models are gaining popularity in both the computer graphics and CAD fields. A related design/modelling problem is the focus of the reported research: drawing...
Phillip N. Azariadis, Nickolas S. Sapidis
SPIN
2004
Springer
14 years 3 months ago
Model-Driven Software Verification
Abstract. In the classic approach to logic model checking, software verification requires a manually constructed artifact (the model) to be written in the language that is accepted...
Gerard J. Holzmann, Rajeev Joshi