Outsourced

Results: 300



#Item
61

OUTSOURCED CIO Ensuring Sound Sleep for Outsourced Chief Investment Officers Whether you are in the midst of an RFP competition or monthly performance reporting to your clients, you are sure to sleep more soundly

Add to Reading List

Source URL: www.cogencysoft.com

Language: English - Date: 2015-08-07 14:16:18
    62

    Private Processing of Outsourced Network Functions: Feasibility and Constructions∗ Luca Melis Hassan Jameel Asghar

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-01-24 19:12:51
      63Search algorithms / K-nearest neighbors algorithm / Cryptography / K-d tree / Paillier cryptosystem / Public-key cryptography / Recommender system / Privacy / Encryption

      Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†

      Add to Reading List

      Source URL: www.icir.org

      Language: English - Date: 2015-10-01 22:05:30
      64Search algorithms / Discrete geometry / Cryptography / K-nearest neighbors algorithm / Voronoi diagram / Encryption / Recommender system / Homomorphic encryption / NN / Nearest neighbor search

      Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson

      Add to Reading List

      Source URL: www.eecs.berkeley.edu

      Language: English - Date: 2015-07-29 20:02:16
      65

      Secure Outsourced Computation of Iris Matching∗ Marina Blanton and Mehrdad Aliasgari Department of Computer Science and Engineering University of Notre Dame {mblanton,maliasga}@cse.nd.edu

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2012-03-16 21:29:04
        66

        Privacy Enhanced Access Control for Outsourced Data Sharing Mariana Raykova, Hang Zhao, and Steven M. Bellovin Columbia University, Department of Computer Science, New York, NY, USA, {mariana,zhao,smb}@cs.colu

        Add to Reading List

        Source URL: fc12.ifca.ai

        Language: English - Date: 2012-02-18 14:34:48
          67

          OUTSOURCED HUM AN RESOURCES B EC AU S E S A N I T Y S H O U LD N E V ER B E T H E PR I C E O F S U CC E S S Compliance with Federal and State regulations isn’t just a requirement for California employers: it’s the o

          Add to Reading List

          Source URL: www.hrideas.com

          Language: English
            68

            SCExpert™Suite for Logistics Service Providers The Outsourced Distribution market is rapidly growing and with that growth LSP’s are required to differentiate themselves by being able to quickly respond to varying requi

            Add to Reading List

            Source URL: www.made4net.com

            Language: English - Date: 2010-09-25 14:09:14
              69

              Oliver Schreiber, itelligence Bringing clarity to the cloud For a majority of companies, IT is a mission-critical resource and is frequently outsourced to professional service providers. This outsourcing is designed to

              Add to Reading List

              Source URL: www.itelligence.ag

              Language: English
                70

                On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun Chunhui Shi

                Add to Reading List

                Source URL: syssec.kaist.ac.kr

                Language: English - Date: 2012-09-03 21:43:00
                  UPDATE