Sciweavers

648 search results - page 67 / 130
» The GCHQ Protocol and Its Problems
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Java and asynchronous iterative applications: large scale experiments
This paper focuses on large scale experiments with Java and asynchronous iterative applications. In those applications, tasks are dependent and the use of distant clusters may be ...
Jacques M. Bahi, Raphaël Couturier, David Lai...
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
14 years 2 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
ACSAC
2006
IEEE
14 years 2 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
IPPS
2006
IEEE
14 years 2 months ago
Achieving strong scaling with NAMD on Blue Gene/L
NAMD is a scalable molecular dynamics application, which has demonstrated its performance on several parallel computer architectures. Strong scaling is necessary for molecular dyn...
Sameer Kumar, Chao Huang, George Almási, La...
WOWMOM
2006
ACM
127views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
AISLE: Autonomic Interface SeLEction for Wireless Users
We address the problem of wireless stations selfconfiguration in a WLAN environment with overlapping access point coverages. We propose and investigate a transport-layer solution...
Claudio Casetti, Carla-Fabiana Chiasserini, Robert...