Results 231 to 240 of about 25,319 (281)
Below the leaves: Integrating above‐ and below‐ground phenology for earth‐system predictability
Read the free Plain Language Summary for this article on the Journal blog. Abstract Almost every aspect of biological systems has phenology—a pattern in activity or function linked to annual cycles. Most terrestrial phenology research focusses on leaves, the onset of leaf out or senescence.
Kendalynn Morris, Richard Nair
wiley +1 more source
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source
Generative Bayesian Computation for Maximum Expected Utility. [PDF]
Polson N, Ruggeri F, Sokolov V.
europepmc +1 more source
Robust optimization for multi-project scheduling via the critical chain method. [PDF]
Tian M, Li X.
europepmc +1 more source
Secured Data Outsourcing in Cloud Computing
openaire +1 more source
Efficient Privacy-Preserving Face Recognition Based on Feature Encoding and Symmetric Homomorphic Encryption. [PDF]
Zhou L, Li Q, Zhu H, Zhou Y, Wu H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Incentivizing outsourced computation
Proceedings of the 3rd international workshop on Economics of networked systems, 2008We describe different strategies a central authority, the boss, can use to distribute computation to untrusted contractors. Our problem is inspired by volunteer distributed computing projects such as SETI@home, which outsource computation to large numbers of participants.
Mira Belenkiy +5 more
openaire +1 more source
Strategic Outsourcing to Cloud Computing
International Journal of Cloud Applications and Computing, 2020A common misperception about cloud computing remains that it represents the ideal solution for outsourcing non-core competencies and a simple maneuver that drives costs down. However, the reality may be the complete opposite. The cloud paradigm changes several processes, patterns, practices, and philosophies; so, while the cloud adoption must be ...
Abdelwahhab SATTA, Sihem Mostefai
openaire +1 more source
2011
The development of multi-party computation was one of the early achievements of theoretical cryptography. Since that time a number of papers have been published which look at specific application scenarios (e-voting, e-auctions), different security guarantees (computational vs unconditional), different adversarial models (active vs passive, static vs ...
Loftus, Jacob J, Smart, Nigel P.
openaire +1 more source
The development of multi-party computation was one of the early achievements of theoretical cryptography. Since that time a number of papers have been published which look at specific application scenarios (e-voting, e-auctions), different security guarantees (computational vs unconditional), different adversarial models (active vs passive, static vs ...
Loftus, Jacob J, Smart, Nigel P.
openaire +1 more source

