Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- A/V (1)
- Array and pointer range checking (1)
- Audio/video (1)
- Buffer overflow (1)
-
- CFIE (1)
- CPU scheduling (1)
- Classification (1)
- Combined field integrat equation (1)
- Computational web portals (1)
- Conferencing (1)
- Decision tree (1)
- Decision tree classifier (1)
- Distributed systems (1)
- EFIE (1)
- ELF (1)
- Electric field integral equation (1)
- Electromagnetic scattering (1)
- Event modeling (1)
- Format string overflow (1)
- Grid tools (1)
- Interoperating portal services (1)
- Linux (1)
- MFIE (1)
- Magnetic field integral equation (1)
- Management sciences (1)
- Middleware (1)
- Operations research (1)
- PMCHW formulation (1)
- Parallel systems (1)
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
Building Decision Tree Classifier On Private Data, Wenliang Du, Zhijun Zhan
Building Decision Tree Classifier On Private Data, Wenliang Du, Zhijun Zhan
Electrical Engineering and Computer Science - All Scholarship
This paper studies how to build a decision tree classifier under the following scenario: a database is vertically partitioned into two pieces, with one piece owned by Alice and the other piece owned by Bob. Alice and Bob want to build a decision tree classifier based on such a database, but due to the privacy constraints, neither of them wants to disclose their private pieces to the other party or to any third party. We present a protocol that allows Alice and Bob to conduct such a classifier building without having to compromise their privacy. Our protocol uses an untrusted …
A Practical Approach To Solve Secure Multi-Party Computation Problems, Wenliang Du, Zhijun Zhan
A Practical Approach To Solve Secure Multi-Party Computation Problems, Wenliang Du, Zhijun Zhan
Electrical Engineering and Computer Science - All Scholarship
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parties want to jointly perform a computation. Each party needs to contribute its private input to this computation, but no party should disclose its private inputs to the other parties, or to any third party. With the proliferation of the Internet, SMC problems becomes more and more important. So far no practical solution has emerged, largely because SMC studies have been focusing on zero information disclosure, an ideal security model that is expensive to achieve. Aiming at developing practical solutions to SMC problems, we propose a new …
Distributed And Multiprocessor Scheduling, Steven J. Chapin, Jon B, Weissman
Distributed And Multiprocessor Scheduling, Steven J. Chapin, Jon B, Weissman
Electrical Engineering and Computer Science - All Scholarship
This chapter discusses CPU scheduling in parallel and distributed systems. CPU scheduling is part of a broader class of resource allocation problems, and is probably the most carefully studied such problem. The main motivation for multiprocessor scheduling is the desire for increased speed in the execution of a workload. Parts of the workload, called tasks, can be spread across several processors and thus be executed more quickly than on a single processor. In this chapter, we will examine techniques for providing this facility. The scheduling problem for multiprocessor systems can be generally stated as \How can we execute a set …
Integration Of Naradabrokering And Audio/Video Conferencing As A Web Service, Hasan Bulut, Geoffrey C. Fox, Shrideep Pallickara, Ahmet Uyar, Wenjun Wu
Integration Of Naradabrokering And Audio/Video Conferencing As A Web Service, Hasan Bulut, Geoffrey C. Fox, Shrideep Pallickara, Ahmet Uyar, Wenjun Wu
Electrical Engineering and Computer Science - All Scholarship
Audio/Video Conferencing Systems need communication channels between their clients in order to transport RTP packets from one client to another. In this paper we investigate audio/video conferencing as a Web Service and the deployment of publish/subscribe systems in the context of audio/video conferencing systems. In this paper we use our research system NaradaBrokering, which supports both peer-to-peer and publish/subscribe paradigms, as a test bed to investigate these ideas. We also present results from our research system.
A Survey Of Various Frequency Domain Integral Equations For The Analysis Of Scattering From Three-Dimensional Dielectric Objects, Baek Ho Jung, T. K. Sarkar, Y.-S. Chung
A Survey Of Various Frequency Domain Integral Equations For The Analysis Of Scattering From Three-Dimensional Dielectric Objects, Baek Ho Jung, T. K. Sarkar, Y.-S. Chung
Electrical Engineering and Computer Science - All Scholarship
In this paper, we present four different formulations for the analysis of electromagnetic scattering from arbitrarily shaped three-dimensional (3-D) homogeneous dielectric body in the frequency domain. The four integral equations treated here are the electric field integral equation (EFIE), the magnetic field integral equation (MFIE), the combined field integral equation (CFIE), and the PMCHW (Poggio, Miller, Chang, Harrington, and Wu) formulation. For the CFIE case, we propose eight separate formulations with different combinations of expansion and testing functions that result in sixteen different formulations of CFIE. One of the objectives of this paper is to illustrate that not all CFIE …
Interoperable Web Services For Computational Portals, Marlon Pierce, Geoffrey C. Fox, Choonhan Youn, Steve Mock, Kurt Mueller
Interoperable Web Services For Computational Portals, Marlon Pierce, Geoffrey C. Fox, Choonhan Youn, Steve Mock, Kurt Mueller
Electrical Engineering and Computer Science - All Scholarship
Computational web portals are designed to simplify access to diverse sets of high performance computing resources, typically through an interface to computational Grid tools. An important shortcoming of these portals is their lack of interoperable and reusable services. This paper presents an overview of research efforts undertaken by our group to build interoperating portal services around a Web Services model. We present a comprehensive view of an interoperable portal architecture, beginning with core portal services that can be used to build Application Web Services, which in turn may be aggregated and managed through portlet containers.
Buffer Overflow And Format String Overflow Vulnerabilities, Kyung-Suk Lhee, Steve J. Chapin
Buffer Overflow And Format String Overflow Vulnerabilities, Kyung-Suk Lhee, Steve J. Chapin
Electrical Engineering and Computer Science - All Scholarship
This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run time. We augment executable files with type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section), and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library.
Perspectives On The Evolution Of Simulation, Richard E. Nance, Robert G. Sargent
Perspectives On The Evolution Of Simulation, Richard E. Nance, Robert G. Sargent
Electrical Engineering and Computer Science - All Scholarship
Simulation is introduced in terms of its different forms and uses, but the focus on discrete event modeling for systems analysis is dominant as it has been during the evolution of the technique within operations research and the management sciences. This evolutionary trace of over almost fifty years notes the importance of bidirectional influences with computer science, probability and statistics, and mathematics. No area within the scope of operations research and the management sciences has been affected more by advances in computing technology than simulation. This assertion is affirmed in the review of progress in those technical areas that collectively …