Results 261 to 270 of about 1,009,466 (301)
Some of the next articles are maybe not open access.
Manual for Using Homomorphic Encryption for Bioinformatics
Proceedings of the IEEE, 2017Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data add ...
Nathan Dowlin +5 more
semanticscholar +1 more source
Accelerating Data Delivery of Latency-Sensitive Applications in Container Overlay Network
IEEE Transactions on Parallel and Distributed Systems, 2023Container overlay network, though being widely adopted to enable communication between containers on different hosts, is a key downside for latency-sensitive applications.
Hao Liu +7 more
semanticscholar +1 more source
A comprehensive survey of hardware-assisted security: From the edge to the cloud
Internet of Things, 2019Sensitive data processing occurs more and more on machines or devices out of users control. In the Internet of Things world, for example, the security of data could be posed at risk regardless the adopted deployment is oriented on Cloud or Edge Computing.
L. Coppolino +3 more
semanticscholar +1 more source
WC-PAD: Web Crawling based Phishing Attack Detection
International Carnahan Conference on Security Technology, 2019Phishing is a criminal offense which involves theft of user’s sensitive data. The phishing websites target individuals, organizations, the cloud storage hosting sites and government websites.
T. Nathezhtha +2 more
semanticscholar +1 more source
Moving Sensitive Data Against Live Memory Dumping, Spectre and Meltdown Attacks
International Conference on Systems Engineering, 2018The emergence of cloud computing allows users to easily host their Virtual Machines with no up-front investment and the guarantee of always available anytime anywhere.
Johannes Sianipar, M. Sukmana, C. Meinel
semanticscholar +1 more source
Alibaba HPN: A Data Center Network for Large Language Model Training
Conference on Applications, Technologies, Architectures, and Protocols for Computer CommunicationThis paper presents HPN, Alibaba Cloud's data center network for large language model (LLM) training. Due to the differences between LLMs and general cloud computing (e.g., in terms of traffic patterns and fault tolerance), traditional data center ...
Kun Qian +17 more
semanticscholar +1 more source
Privacy-aware querying over sensitive trajectory data
International Conference on Information and Knowledge Management, 2011N. Pelekis +4 more
semanticscholar +1 more source
PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data
2016 IEEE International Conference on Web Services (ICWS), 2016Rui Zhang, Rui Xue, Ting Yu, Ling Liu
semanticscholar +1 more source
An overview of real‐world data sources for oncology and considerations for research
Ca-A Cancer Journal for Clinicians, 2022Lynne Penberthy +2 more
exaly
International Conference on Cloud Computing Technologies and Applications, 2017
An Braeken +3 more
semanticscholar +1 more source
An Braeken +3 more
semanticscholar +1 more source

