Search
Now showing items 1-7 of 7
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
(
Elsevier
, 2015 , Article)
Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...
Assessing the effects of data selection and representation on the development of reliable E. coli sigma 70 promoter region predictors
(
Public Library of Science
, 2015 , Article)
As the number of sequenced bacterial genomes increases, the need for rapid and reliable tools for the annotation of functional elements (e.g., transcriptional regulatory elements) becomes more desirable. Promoters are the ...
A Practical and Scalable Tool to Find Overlaps between Sequences
(
Hindawi
, 2015 , Article)
The evolution of the next generation sequencing technology increases the demand for efficient solutions, in terms of space and time, for several bioinformatics problems. This paper presents a practical and easy-to-implement ...
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ...
Paillier's encryption: Implementation and cloud applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...