Sciweavers

5476 search results - page 45 / 1096
» Resettably Secure Computation
Sort
View
SPEECH
2010
125views more  SPEECH 2010»
14 years 10 months ago
Automatic intonation assessment for computer aided language learning
In this paper the nature and relevance of the information provided by intonation is discussed in the framework of second language learning. As a consequence, an automatic intonati...
Juan Pablo Arias, Néstor Becerra Yoma, Hira...
119
Voted
SMC
2010
IEEE
121views Control Systems» more  SMC 2010»
15 years 1 months ago
Learning of personalized security settings
—While many cybersecurity tools are available to computer users, their default configurations often do not match needs of specific users. Since most modern users are not computer...
Mehrbod Sharifi, Eugene Fink, Jaime G. Carbonell
190
Voted
ICDCS
2010
IEEE
15 years 27 days ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
142
Voted
CLUSTER
2002
IEEE
15 years 3 months ago
Security Implications of Typical Grid Computing Usage Scenarios
A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to these...
Marty Humphrey, Mary R. Thompson
127
Voted
SAC
2009
ACM
15 years 10 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...