Sciweavers

2927 search results - page 33 / 586
» Secure Distributed Human Computation
Sort
View
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
14 years 8 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
FC
2006
Springer
108views Cryptology» more  FC 2006»
13 years 11 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
JPDC
2007
86views more  JPDC 2007»
13 years 7 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
ADHOCNOW
2004
Springer
14 years 1 months ago
Energy-Memory-Security Tradeoffs in Distributed Sensor Networks
David Hwang, Bo-Cheng Lai, Ingrid Verbauwhede
ICPP
2007
IEEE
14 years 2 months ago
Designing NFS with RDMA for Security, Performance and Scalability
Ranjit Noronha, Lei Chai, Thomas Talpey, Dhabalesw...