- Filter by:
-
Content Type
-
Topic
-
Efficient Private Information Retrieval Using Secure Hardware
Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...
Download Now -
MobSafe: Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC (Personal Computer), Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this...
Download Now -
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity...
Download Now -
QoS-Aware Virtual Machine Scheduling for Video Streaming Services in Multi-Cloud
Video streaming services are trending to be deployed on cloud. Cloud computing offers better stability and lower price than traditional IT facilities. Huge storage capacity is essential for video streaming service. More and more cloud providers appear so there is increasing cloud platforms to choose. A better choice is to...
Download Now -
Breaking the On-Chip Latency Barrier Using SMART
As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...
Download Now -
Big Data: The Management Revolution
In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.
Watch Now -
Education Entrepreneurship in India
The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.
Watch Now -
How to Create a B2B Content Marketing Strategy
In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.
Watch Now -
New Insights Into Technology, Innovation and Entrepreneurship
Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"
Watch Now -
The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage
In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.
Watch Now