Sciweavers

1510 search results - page 278 / 302
» Secure Distributed Data Aggregation
Sort
View
CCR
2010
128views more  CCR 2010»
13 years 5 months ago
The 2nd workshop on active internet measurements (AIMS-2) report
On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshop...
kc claffy, Emile Aben, Jordan Augé, Robert ...
SPAA
2003
ACM
14 years 25 days ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
DCC
2007
IEEE
14 years 7 months ago
On Compression of Encrypted Video
We consider video sequences that have been encrypted uncompressed. Since encryption masks the source, traditional data compression algorithms are rendered ineffective. However, it...
Daniel Schonberg, Chuohao Yeo, Stark C. Draper, Ka...
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 28 days ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar