Results 41 to 50 of about 25,319 (281)
Privacy-preserving verifiable delegation of polynomial and matrix functions
Outsourcing computation has gained significant popularity in recent years due to the development of cloud computing and mobile services. In a basic outsourcing model, a client delegates computation of a function f on an input x to a server. There are two
Zhang Liang Feng, Safavi-Naini Reihaneh
doaj +1 more source
Exploiting Environmental Computation in a Multi-Agent Model of Slime Mould
Very simple organisms, such as the single-celled amoeboid slime mould Physarum polycephalum possess no neural tissue yet, despite this, are known to exhibit complex biological and computational behaviour.
Jones, Jeff
core +1 more source
Overdoping high temperature superconductors, such as YBa2Cu3O7‐δ (YBCO), is expected to maxime the critical current density by optimising the condensation energy for a given defect landscape, providing new thrust for the development of fusion enabling coated conductors. Here, precise oxygen control is achieved via an electrochemical method allowing for
Alexander Stangl +7 more
wiley +1 more source
Lime: Data Lineage in the Malicious Environment
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era.
Backes, Michael +2 more
core +1 more source
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [PDF]
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs.
Koushanfar, Farinaz +5 more
core +2 more sources
MXene‐Coated 3D Printed Horn Antennas for Ku Frequency Band
An additive manufacturing approach to 3D printing horn antennas and coating them with Ti3C2Tx MXene is proposed. Rapid fabrication of lightweight, high‐performance antennas operating in the Ku‐band (12.4–18 GHz) has been demonstrated. The MXene‐coated antennas exhibit comparable electromagnetic performance to conventional, costly aluminum ones, with ...
Zahra Sarpanah Sourkouhi +3 more
wiley +1 more source
Secure and Efficient Nearest Neighbor Query for an Outsourced Database
Cloud computing enables resource-constrained clients to outsource their computation-intensive data storage and computation tasks to a cloud server. Although it creates many benefits, data outsourcing causes some security challenges for clients.
Jingjing Guo, Jiacong Sun
doaj +1 more source
Preserving Both Privacy and Utility in Network Trace Anonymization
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam +22 more
core +1 more source
This study explores how information processing is distributed between brains and bodies through a codesign approach. Using the “backpropagation through soft body” framework, brain–body coupling agents are developed and analyzed across several tasks in which output is generated through the agents’ physical dynamics.
Hiroki Tomioka +3 more
wiley +1 more source
Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare ...
Xiaohui Yang, Chenshuo Zhang
doaj +1 more source

