Results 61 to 70 of about 79,561 (230)

The Refugee Problem: An International Legal Tangle [PDF]

open access: yes, 1958
Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization,
Bradway, John S., Evans, Alona E.
core   +1 more source

Building worker power for day laborers in South Korea's construction industry [PDF]

open access: yes, 2020
This article examines how unions build worker power for day laborers in South Korea’s construction industry in the context of widespread informality.
Chun, Jennifer Jihye, Yi, Sohoon
core  

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network

open access: yesIEEE Access, 2018
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy.
Xiaoqin Feng   +4 more
doaj   +1 more source

DeepSecure: Scalable Provably-Secure Deep Learning [PDF]

open access: yes, 2017
This paper proposes DeepSecure, a novel framework that enables scalable execution of the state-of-the-art Deep Learning (DL) models in a privacy-preserving setting. DeepSecure targets scenarios in which neither of the involved parties including the cloud
Koushanfar, Farinaz   +2 more
core   +1 more source

Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing

open access: yesIEEE Access, 2018
Deploying electronic health records (EHRs) is now an undisputable trend in healthcare systems. Through affording benefits like flexibility and low cost, the cutting-cloud cloud storage is becoming a popular solution to store a massive amount of EHRs to ...
Hanlin Zhang   +5 more
doaj   +1 more source

Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling [PDF]

open access: yes, 2007
Reducing the cost for business or scientific computations, is a commonly expressed goal in today’s companies. Using the available computers of local employees or the outsourcing of such computations are two obvious solutions to save money for additional ...
Schridde, C.
core  

BLOOM: BLoom filter based oblivious outsourced matchings

open access: yesBMC Medical Genomics, 2017
Background Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical
Jan Henrik Ziegeldorf   +8 more
doaj   +1 more source

Tracking Chart 2004 Adidas Salomon, Indonesia 36023381C [PDF]

open access: yes, 2004
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide.
Fair Labor Association
core   +1 more source

On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications

open access: yesMathematics
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular ...
Satyabrat Rath   +2 more
doaj   +1 more source

A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication

open access: yesIEEE Access, 2019
The face recognition has become a common means of identity authentication because of the advantages of uniqueness, non-invasive and not easy to be stolen. The outsourcing of face recognition to the service provider is a typical manner nowadays.
Xiang Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy