-
1
-
-
84878810103
-
-
accessed 04.01.15
-
AWS Case Study: Euclid, http://aws.amazon.com/solutions/case-studies/euclid/, [accessed 04.01.15].
-
AWS Case Study: Euclid
-
-
-
2
-
-
84878810103
-
-
accessed 04.01.15
-
AWS Case Study: Nearmap, http://aws.amazon.com/solutions/case-studies/nearmap/, [accessed 04.01.15].
-
AWS Case Study: Nearmap
-
-
-
3
-
-
84878810103
-
-
accessed 04.01.15
-
AWS Case Study: Bioproximity, http://aws.amazon.com/solutions/case-studies/bioproximity/, [accessed 04.01.15].
-
AWS Case Study: Bioproximity
-
-
-
5
-
-
84860577964
-
On the (im)possibility of obfuscating programs
-
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, and Salil Vadhan, et al. On the (im)possibility of obfuscating programs J ACM 59 2 May 2012 Article 6
-
(2012)
J ACM
, vol.59
, Issue.2
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
-
6
-
-
84929382531
-
-
accessed 04.01. 15
-
Bioproximity, http://www.bioproximity.com, [accessed 04.01. 15].
-
-
-
-
7
-
-
0022808786
-
A computational approach to edge detection
-
IEEE Nov. PAMI
-
John Canny A computational approach to edge detection IEEE Trans Pattern Analysis Mach Intell PAMI-8 6 Nov. 1986 679 698 IEEE
-
(1986)
IEEE Trans Pattern Analysis Mach Intell
, vol.8
, Issue.6
, pp. 679-698
-
-
Canny, J.1
-
8
-
-
84894280079
-
Toward private joins on outsourced data
-
IEEE
-
Bogdan Carbunar, and Radu Sion Toward private joins on outsourced data IEEE Trans Knowl Data Eng 24 9 2012 1699 1710 IEEE
-
(2012)
IEEE Trans Knowl Data Eng
, vol.24
, Issue.9
, pp. 1699-1710
-
-
Carbunar, B.1
Sion, R.2
-
9
-
-
84959058990
-
Protecting software code by guards
-
Springer Berlin Heidelberg
-
Hoi Chang, and Atallah Mikhail Protecting software code by guards Secur Priv Digital Rights Manag 2002 160 175 Springer Berlin Heidelberg
-
(2002)
Secur Priv Digital Rights Manag
, pp. 160-175
-
-
Chang, H.1
Mikhail, A.2
-
10
-
-
84929382532
-
-
accessed 04.01.15
-
Cloudinary, http://cloudinary.com/features#image-manipulation, [accessed 04.01.15].
-
-
-
-
11
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
Aug. IEEE
-
Christian Collberg, and Clark Thomborson Watermarking, tamper-proofing, and obfuscation - tools for software protection IEEE Trans Softw Eng 28 8 Aug 2002 735 746 IEEE
-
(2002)
IEEE Trans Softw Eng
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
16
-
-
84929382533
-
-
accessed 04.01.15
-
Euclid, http://euclidanalytics.com, [accessed 04.01.15].
-
-
-
-
18
-
-
84893494300
-
Candidate indistinguishability obfuscation and functional encryption for all circuits
-
IEEE
-
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Roykova, Amit Sahai, and Brent Waters Candidate indistinguishability obfuscation and functional encryption for all circuits Proceedings of 2013 IEEE 54th annual symposium on Foundations of Computer Science (FOCS 2014) 2013 IEEE 40 49
-
(2013)
Proceedings of 2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS 2014)
, pp. 40-49
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Roykova, M.4
Sahai, A.5
Waters, B.6
-
22
-
-
84929382534
-
-
accessed 04.01.15
-
Hadoop4Images, https://github.com/Aishraj/Hadoop4Images/blob/master/Hadoop4Images/src/canny/CannyEdgeDetector.java, [accessed 04.01.15].
-
Hadoop4Images
-
-
-
24
-
-
84857187532
-
Provisioning and evaluating multi-domain networked clouds for Hadoop-based applications
-
IEEE
-
Anirban Mandal, Yufeng Xin, Ilia Baldine, Paul Ruth, Chris Heerman, and Jeff Chase, et al. Provisioning and evaluating multi-domain networked clouds for Hadoop-based applications Proceedings of 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom 2011) 2011 IEEE 690 697
-
(2011)
Proceedings of 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom 2011)
, pp. 690-697
-
-
Mandal, A.1
Xin, Y.2
Baldine, I.3
Ruth, P.4
Heerman, C.5
Chase, J.6
-
25
-
-
84929382535
-
-
accessed 04.01.15
-
Nearmap, http://us.nearmap.com, [accessed 04.01.15].
-
-
-
-
26
-
-
84949509764
-
Experience with software watermarking
-
IEEE
-
Jens Palsberg, Sowmya Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, and Yi Zhang Experience with software watermarking Proceedings of 16th IEEE Annual Computer Security Applications Conference (ACSAC 2000) 2000 IEEE 308 316
-
(2000)
Proceedings of 16th IEEE Annual Computer Security Applications Conference (ACSAC 2000)
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
27
-
-
85015649873
-
Airavat: Security and privacy for mapreduce
-
USENIX Association
-
Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel Airavat: security and privacy for mapreduce Proceedings of the 7th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2010) 2010 USENIX Association 297 312
-
(2010)
Proceedings of the 7th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2010)
, pp. 297-312
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
28
-
-
80053031586
-
Code obfuscation against static and dynamic reverse engineering
-
Proceedings of the 13th International Conference on Information Hiding
-
Sebastian Schrittwieser, and Stefan Katzenbeisser Code obfuscation against static and dynamic reverse engineering Proceedings of the 13th international conference on Information Hiding LNCS vol. 6958 2011 270 284
-
(2011)
LNCS
, vol.6958
, pp. 270-284
-
-
Schrittwieser, S.1
Katzenbeisser, S.2
-
33
-
-
0001956132
-
Soot-a Java Optimization Framework
-
IBM Press
-
Raja Vallée-Rai, Phong Co, Etienne Gagnon, Laurie Hendren, Patrick Lam, and Vijay Sundaresan Soot-a Java Optimization Framework Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research (CASCON 1999) 1999 IBM Press
-
(1999)
Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research (CASCon 1999)
-
-
Vallée-Rai, R.1
Co, P.2
Gagnon, E.3
Hendren, L.4
Lam, P.5
Sundaresan, V.6
-
37
-
-
84929317908
-
Cross Cloud MapReduce: A result integrity check framework on hybrid clouds
-
Yongzhi Wang, Jinpeng Wei, and Mudhakar Srivatsa Cross Cloud MapReduce: a result integrity check framework on hybrid clouds Int J Cloud Comput (IJCC) 1 1 2013 26 39
-
(2013)
Int J Cloud Comput (IJCC)
, vol.1
, Issue.1
, pp. 26-39
-
-
Wang, Y.1
Wei, J.2
Srivatsa, M.3
-
39
-
-
80755169468
-
Sedic: Privacy-aware data intensive computing on hybrid clouds
-
ACM
-
Kehuan Zhang, Xiaoyong Zhou, Yangyi Chen, XiaoFeng Wang, and Yaoping Ruan Sedic: privacy-aware data intensive computing on hybrid clouds Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011) 2011 ACM 515 526
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011)
, pp. 515-526
-
-
Zhang, K.1
Zhou, X.2
Chen, Y.3
Wang, X.4
Ruan, Y.5
|