Sciweavers

472 search results - page 14 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
ADHOCNETS
2009
Springer
14 years 2 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte
NSDI
2010
13 years 9 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
ECIS
2000
13 years 9 months ago
The Exercise of Power and Information Systems Strategy: The Need for a New Perspective
- Computer based information systems (IS) in work-based organisation are generally acknowledged as incorporating a social as well as technical dimension. Information system strateg...
K. S. Horton
IJCAI
1997
13 years 9 months ago
Machine Learning Techniques to Make Computers Easier to Use
Identifying user-dependent information that can be automatically collected helps build a user model by which 1) to predict what the user wants to do next and 2) to do relevant pre...
Hiroshi Motoda, Kenichi Yoshida
DC
2007
13 years 7 months ago
On private computation in incomplete networks
Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious...
Amos Beimel