A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Comprehensive Survey on Secure Outsourced Computation and its Applications
2019
IEEE Access
In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. ...
Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks. ...
Then he encrypts the n C + 1 coefficients of the polynomial using a semantically-secure homomorphic encryption scheme. ...
doi:10.1109/access.2019.2949782
fatcat:ternbyhqezgd5cvhtfqfggqdqq
Analysis of Security Algorithms for a Distributed Database
2018
2018 3rd International Conference on Computer Science and Information Engineering (ICCSIE 2018)
unpublished
This paper analyzed the security of a database considering the environment of distributed systems. ...
The deductive method and the exploratory investigation were used to analyze the information of the articles of the reference. ...
Acknowledgment The authors thanks to Universidad Politécnica Salesiana del Ecuador, to the research group of the Guayaquil Headquarters "Computing, Security and Information Technology for a Globalized ...
doi:10.23977/iccsie.2018.1025
fatcat:rujexaywp5cjfe2uy32vk4wfta
Artificial Intelligence and Law
1994
International Journal of Law and Information Technology
Standardized security for different types of clouds was bluntly an afterthought to cost savings. ...
The Need for Open File Formats
Information in the Cloud
ACKNOWLEDGEMENTS Thanks to everyone who provided comments and insights on previous drafts of this paper. ...
Various fields including author, custodian, date, file type, and responsive were searched and sampled using the following four sampling techniques: 1. ...
doi:10.1093/ijlit/2.2.154
fatcat:ff7kwvvn3vcbblhlkf63oqntyu
Artificial Intelligence and the Law
2017
ITNOW
Standardized security for different types of clouds was bluntly an afterthought to cost savings. ...
The Need for Open File Formats
Information in the Cloud
ACKNOWLEDGEMENTS Thanks to everyone who provided comments and insights on previous drafts of this paper. ...
Various fields including author, custodian, date, file type, and responsive were searched and sampled using the following four sampling techniques: 1. ...
doi:10.1093/itnow/bwx017
fatcat:62ezubai3fcwlpie35xjq3iyem
A Defense of (s)crappy Robots
[article]
2020
Zenodo
Participants will collaborate with others on the design of the machine and share their prototype with the rest of the group. ...
In this hands-on workshop, participants will engage in making scrappy DIY robots out of everyday materials that are not designed to work perfectly. ...
The activity in this paper showed just one approach to using ML-ABM in education: to increase complexity by adding a level in the form of a model. ...
doi:10.5281/zenodo.5501878
fatcat:snjtztj37fbbpeszscwhk63uj4
IMMM 2014 COMMITTEE IMMM Advisory Committee
unpublished
a series of academic and industrial events focusing on advances in all aspects related to information mining, management, and use. ...
We hope that Paris, France, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city. IMMM 2014 Chairs: IMMM Advisory Committee ...
, e.g., Cosine measure, Dice's coefficient [21] . ...
fatcat:o5d5shizvratfpaaiibw7o2dhm
Processing of Polarization Patterns and Visual Self-Motion in the Locust Central Complex for Spatial Orientation
2022
Internally, moving through the environment generates optic flow---the motion of the viewed scenery on the retina---, which may inform about turning maneuvers, movement speed, and covered distance. ...
the sun itself, useful as an external reference cue. ...
Basil el Jundi for helpful discussions on the manuscript draft, and Martina Kern for maintaining locust cultures. ...
doi:10.17192/z2022.0085
fatcat:6w5wbimgojclzbivuujarlzoqi