Sciweavers

2927 search results - page 4 / 586
» Secure Distributed Human Computation
Sort
View
CSE
2008
IEEE
14 years 2 months ago
3D Computer Simulations of Pulsatile Human Blood Flows in Vessels and in the Aortic Arch: Investigation of Non-Newtonian Charact
Methods of Computational Fluid Dynamics are applied to simulate pulsatile blood flow in human vessels and in the aortic arch. The non-Newtonian behaviour of the human blood is in...
Renat A. Sultanov, Dennis Guster, Brent Engelbrekt...
SAC
2004
ACM
14 years 1 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
WPES
2003
ACM
14 years 1 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton