Results 51 to 60 of about 79,561 (230)
Beyond BRIC: offshoring in non-BRIC countries: Egypt – a new growth market: an LSE Outsourcing Unit report January 2009 [PDF]
This report was commissioned as an independently researched report by Hill & Knowlton, acting for the Information Technology Industry Development Agency (ITIDA) of Egypt.
Griffiths, Catherine +2 more
core
Securely Outsourcing Large Scale Eigen Value Problem to Public Cloud
Cloud computing enables clients with limited computational power to economically outsource their large scale computations to a public cloud with huge computational power.
Aktar, Shamminuj +2 more
core +1 more source
Cloud outsourcing secret sharing scheme against covert adversaries
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of ...
En ZHANG +5 more
doaj +2 more sources
Outsourcing Large-Scale Quadratic Programming to a Public Cloud
Cloud computing provides service for resource-constrained customers to perform large-scale scientific computation. However, it also brings some new challenges, which have to be considered in designing outsourcing protocols.
Lifeng Zhou, Chunguang Li
doaj +1 more source
In the medical field, with the increasing number of medical images, medical image classification has become a hot spot. The convolutional neural network, a technology that can process more images and extract more accurate features with nonlinear models ...
Qing Yu +3 more
doaj +1 more source
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values [PDF]
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems.
Butler, Kevin +3 more
core
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use ...
Shengxia Zhang +4 more
semanticscholar +1 more source
On the Security of Offloading Post-Processing for Quantum Key Distribution
Quantum key distribution (QKD) has been researched for almost four decades and is currently making its way to commercial applications. However, deployment of the technology at scale is challenging because of the very particular nature of QKD and its ...
Thomas Lorünser +3 more
doaj +1 more source
Outsourcing machine learning models to cloud servers allows data owners to train and utilize models without investing in dedicated hardware. However, this approach raises significant concerns regarding the proprietary nature of the models and the data ...
Nawal Almutairi
doaj +1 more source
PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem
Background As one of the fundamental problems in bioinformatics, the double digest problem (DDP) focuses on reordering genetic fragments in a proper sequence. Although many algorithms for dealing with the DDP problem were proposed during the past decades,
Jingwen Suo +5 more
doaj +1 more source

