Sciweavers

2446 search results - page 30 / 490
» Where am I
Sort
View
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 10 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
INFOCOM
2008
IEEE
14 years 4 months ago
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks
— Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functiona...
Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun ...
WWW
2001
ACM
14 years 10 months ago
iMobile: An Agent-Based Platform for Mobile Services
iMobile is a platform that addresses the research issues in building mobile services. iMobile acts as a message gateway that allows mobile devices using various protocols on diffe...
Herman Chung-Hwa Rao, Yih-Farn Chen, Di-Fa Chang, ...
SPAA
1993
ACM
14 years 1 months ago
Supporting Sets of Arbitrary Connections on iWarp Through Communication Context Switches
In this paper we introduce the ConSet communication model for distributed memory parallel computers. The communication needs of an application program can be satisfied by some ar...
Anja Feldmann, Thomas Stricker, Thomas E. Warfel
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan