Search
Now showing items 11-20 of 74
An efficient instance hiding scheme
(
Association for Computing Machinery
, 2016 , Conference Paper)
Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
(
Springer Verlag
, 2016 , Conference Paper)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Corrosion behavior of API X-80 steel in hydrogen sulfide environment at different temperatures
(
National Assoc. of Corrosion Engineers International
, 2016 , Conference Paper)
The electrochemical behavior of API X-80 steel materials in 3.5% wt. of NaCI solution containing different concentration of H2S at different temperatures was studied. Potendiodynamic polarization, electrochemical impedance ...
Monitoring DVT cuffs for long-term operation: A fuzzy approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
Similarity Group-by Operators for Multi-Dimensional Relational Data
(
IEEE Computer Society
, 2016 , Conference Paper)
The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ...
Group owner election in Wi-Fi direct
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...
A scalable solution for finding overlaps between sequences using map-reduce
(
The International Society for Computers and Their Applications (ISCA)
, 2016 , Conference Paper)
The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ...
Image stitching system with scanning microscopy for histopathological applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
Edms model verification considering remarkable changes in airport traffic system
(
Hungarian Meteorological Service
, 2016 , Conference Paper)
This paper presents the verification process of the Emission and Dispersion Modeling System adapted to evaluate the air quality of Liszt Ferenc International Airport. One receptor point was selected at the Airport, at ...
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...