Results 31 to 40 of about 25,319 (281)
Outsourcing Computation: The Minimal Refereed Mechanism [PDF]
17 pages, 1 figure; WINE 2019: The 15th Conference on Web and Internet ...
Yuqing Kong +3 more
openaire +2 more sources
Algorithms for Outsourcing Pairing Computation [PDF]
We address the question of how a computationally limited device may outsource pairing computation in cryptography to another, potentially malicious, but much more computationally powerful device. We introduce two new efficient protocols for securely outsourcing pairing computations to an untrusted helper.
Guillevic, Aurore, Vergnaud, Damien
openaire +2 more sources
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud
The increasing massive data generated by various sources has given birth to big data analytics. Solving large-scale nonlinear programming problems (NLPs) is one important big data analytics task that has applications in many domains such as transport and
C Wang +14 more
core +1 more source
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef +2 more
core +3 more sources
Security Outsourcing Algorithms by Unimodular Matrix Encryption Method
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also ...
ZHANG Shengxia, TIAN Chengliang
doaj +1 more source
Securely Outsourcing Large Scale Eigen Value Problem to Public Cloud
Cloud computing enables clients with limited computational power to economically outsource their large scale computations to a public cloud with huge computational power.
Aktar, Shamminuj +2 more
core +1 more source
Verifying Outsourced Computation in an Edge Computing Marketplace
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions in the presence of both ...
Harth-Kitzerow, Christopher +1 more
openaire +2 more sources
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.
Shuai Li +3 more
doaj +1 more source
Towards the cloudification of the social networks analytics [PDF]
In the last years, with the increase of the available data from social networks and the rise of big data technologies, social data has emerged as one of the most profitable market for companies to increase their benefits.
Ayguadé Parra, Eduard +4 more
core +1 more source
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li +8 more
wiley +1 more source

