Sciweavers

788 search results - page 60 / 158
» Secure Data Objects Replication in Data Grid
Sort
View
PET
2004
Springer
14 years 1 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
GRID
2005
Springer
14 years 1 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
SAC
2003
ACM
14 years 1 months ago
UbiData: Ubiquitous Mobile File Service
One of the most challenging objectives of mobile data management is the ubiquitous, any time, anywhere access. This objective is very difficult to meet due to several network and ...
Jinsuo Zhang, Abdelsalam Helal, Joachim Hammer
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 8 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
BMCBI
2008
106views more  BMCBI 2008»
13 years 8 months ago
Comparison of normalisation methods for surface-enhanced laser desorption and ionisation (SELDI) time-of-flight (TOF) mass spect
Background: Mass spectrometry for biological data analysis is an active field of research, providing an efficient way of high-throughput proteome screening. A popular variant of m...
Wouter Meuleman, Judith Y. M. N. Engwegen, Marie-C...