-
1
-
-
84958023660
-
Face Recognition: A Tutorial on Computational Aspects
-
Hershey, PA: IGI
-
Alling, A., Powers, N., & Soyata, T. (2015). Face Recognition: A Tutorial on Computational Aspects. In Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing. Hershey, PA: IGI.
-
(2015)
Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing
-
-
Alling, A.1
Powers, N.2
Soyata, T.3
-
2
-
-
0031948978
-
The ISHNE Holter Standard Output File Format
-
Badilini, F. (1998). The ISHNE Holter Standard Output File Format. Annals of Noninvasive Cardiology, 263-266.
-
(1998)
Annals of Noninvasive Cardiology
, pp. 263-266
-
-
Badilini, F.1
-
3
-
-
0024606026
-
Bounded-Width Polynomial Size Brancing Programs Recognized Exactly Those Languages in NC1
-
Barrington, D. (1989). Bounded-Width Polynomial Size Brancing Programs Recognized Exactly Those Languages in NC1. Journal of Computer and System Sciences, 38(1), 150-164. doi:10.1016/0022-0000(89)90037-8.
-
(1989)
Journal of Computer and System Sciences
, vol.38
, Issue.1
, pp. 150-164
-
-
Barrington, D.1
-
4
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
Boneh, D., Goh, E.-J., & Nissim, K. (2005). Evaluating 2-DNF Formulas on Ciphertexts. Proceedings of the 2nd International Conference on Theory of Cryptography, (pp. 325-341). doi:10.1007/978-3-540-30576-7_18.
-
(2005)
Proceedings of the 2nd International Conference on Theory of Cryptography
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
5
-
-
84856466374
-
Leveled Fully Homomorphic Encryption without Bootstrapping
-
Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2012). Leveled Fully Homomorphic Encryption without Bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (pp. 309-325). doi:10.1145/2090236.2090262.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
7
-
-
84958023661
-
-
(n.d.). Retrieved from
-
CR2032. (n.d.). Retrieved from http://en.wikipedia.org/wiki/CR2032_battery.
-
CR2032
-
-
-
8
-
-
84958023662
-
-
(n.d.). Retrieved from
-
CardioLeaf-Pro. (n.d.). Retrieved from http://www.clearbridgevitalsigns.com/.
-
CardioLeaf-Pro
-
-
-
9
-
-
78650836659
-
The telemetric and holter ECG warehouse initiative (THEW). A data repository for the design, implementation and validation of ECG-related technologies
-
Couderc, J. (2010). The telemetric and holter ECG warehouse initiative (THEW). A data repository for the design, implementation and validation of ECG-related technologies. Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 6252-6255. doi:10.1109/ IEMBS.2010.5628067.
-
(2010)
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
, pp. 6252-6255
-
-
Couderc, J.1
-
10
-
-
78649464426
-
A Generalization of Paillie's Public Key System with Applications to Electronic Voting
-
Damgard, I., Jurik, M., & Nielsen, J. B. (2010). A Generalization of Paillie's Public Key System with Applications to Electronic Voting. International Journal of Information Security, 9(6), 371-385. doi:10.1007/s10207-010-0119-9.
-
(2010)
International Journal of Information Security
, vol.9
, Issue.6
, pp. 371-385
-
-
Damgard, I.1
Jurik, M.2
Nielsen, J.B.3
-
11
-
-
85032555748
-
-
(n.d.). Retrieved from DARPA-PROCEED
-
DARPA-PROCEED. (n.d.). Retrieved from DARPA-PROCEED: http://www.darpa.mil/Our_Work/I2O/Programs/PROgramming_Computation_on_EncryptEd_Data_(PROCEED).aspx.
-
DARPA-PROCEED
-
-
-
12
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654. doi:10.1109/TIT.1976.1055638.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
13
-
-
77954642756
-
Fully Homomorphic Encryption over the Integers
-
Dijk, M., Gentry, C., Halevi, S., & Vaikuntanathan, V. (2010). Fully Homomorphic Encryption over the Integers. Advances in Cryptology (EUROCRYPT), 24-43.
-
(2010)
Advances in Cryptology (EUROCRYPT)
, pp. 24-43
-
-
Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
14
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms
-
El Gamal, T. (1985). A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory, 31(4), 469-472. doi:10.1109/TIT.1985.1057074.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
15
-
-
84980098899
-
Die Systolendauer im Elektrokardiogramm bei normalen Menschen und bei Herzkranken
-
Fridericia, L. S. (1920). Die Systolendauer im Elektrokardiogramm bei normalen Menschen und bei Herzkranken. Acta Medica Scandinavica, 53(1), 469-486. doi:10.1111/j.0954-6820.1920.tb18266.x.
-
(1920)
Acta Medica Scandinavica
, vol.53
, Issue.1
, pp. 469-486
-
-
Fridericia, L.S.1
-
17
-
-
84865518868
-
Homomorphic Evaluation of the AES Circuit
-
R. Safavi-Naini & R. Canetti (Eds.), Springer Berlin Heidelberg
-
Gentry, C., Halevi, S., & Smart, N. (2012). Homomorphic Evaluation of the AES Circuit. In R. Safavi-Naini & R. Canetti (Eds.), Advances in Cryptology - CRYPTO 2012 (Vol. 7417, pp. 850-867). Springer Berlin Heidelberg. doi:10.1007/978-3-642-32009-5_49.
-
(2012)
Advances in Cryptology - CRYPTO 2012
, vol.7417
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.3
-
20
-
-
84926670896
-
Why Healthcare Must Embrace Cloud Computing
-
Good, S. (2013). Why Healthcare Must Embrace Cloud Computing. Forbes.
-
(2013)
Forbes
-
-
Good, S.1
-
21
-
-
84905388736
-
Algorithms in HElib
-
Santa Barbara, CA
-
Halevi, S., & Shoup, V. (2014). Algorithms in HElib. Proceedings, Part I, Advanced in Cryptology -CRYPTO 2014 - 34th Annual Cryptology Conference, (pp. 554-571). Santa Barbara, CA. doi:10.1007/978-3-662-44371-2_31.
-
(2014)
Proceedings, Part I, Advanced in Cryptology -CRYPTO 2014 - 34th Annual Cryptology Conference
, pp. 554-571
-
-
Halevi, S.1
Shoup, V.2
-
23
-
-
85032521343
-
-
HIPAA. (2014). Retrieved from http://www.hhs.gov/ocr/privacy/.
-
(2014)
HIPAA
-
-
-
24
-
-
84958023664
-
-
(n.d.). Retrieved from
-
iPhone5s. (n.d.). Retrieved from http://www.anandtech.com/print/7335/the-iphone5s-review.
-
iPhone5s
-
-
-
25
-
-
38049046515
-
Evaluating Branching Programs on Encrypted Data
-
Amsterdam
-
Ishai, Y., & Paskin, A. (2007). Evaluating Branching Programs on Encrypted Data. Theory of Cryptography, 4th Theory of Cryptography Conference, (TCC) 2007, (pp. 575-594). Amsterdam.
-
(2007)
Theory of Cryptography, 4th Theory of Cryptography Conference, (TCC) 2007
, pp. 575-594
-
-
Ishai, Y.1
Paskin, A.2
-
26
-
-
84926617304
-
Medical Data Analytics in the cloud using Homomorphic Encryption
-
P. R. Deka (Ed.), Hershey, PA: IGI Global
-
Kocabas, O., & Soyata, T. (2014). Medical Data Analytics in the cloud using Homomorphic Encryption. In P. R. Deka (Ed.), Handbook of Research on Cloud Infrastructures for Big Data Analytics (pp. 471-488). Hershey, PA: IGI Global; doi:10.4018/978-1-4666-5864-6.ch019.
-
(2014)
Handbook of Research on Cloud Infrastructures for Big Data Analytics
, pp. 471-488
-
-
Kocabas, O.1
Soyata, T.2
-
27
-
-
84892542004
-
Assessment of Cloud-based Health Monitoring using Homomorphic Encryption
-
Ashville, VA, USA
-
Kocabas, O., Soyata, T., Couderc, J.-P., Aktas, M., Xia, J., & Huang, M. (2013). Assessment of Cloud-based Health Monitoring using Homomorphic Encryption. Proceedings of the 31st IEEE International Conference on Computer Design (ICCD), (pp. 443-446). Ashville, VA, USA. doi:10.1109/ICCD.2013.6657078.
-
(2013)
Proceedings of the 31st IEEE International Conference on Computer Design (ICCD)
, pp. 443-446
-
-
Kocabas, O.1
Soyata, T.2
Couderc, J.-P.3
Aktas, M.4
Xia, J.5
Huang, M.6
-
28
-
-
0034507841
-
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation
-
Redondo Beach: ACM
-
Kushilevitz, E., & Ishai, Y. (2000). Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. 41st Annual Symposium on Foundations of Computer Science, (pp. 294-304). Redondo Beach: ACM.
-
(2000)
41st Annual Symposium on Foundations of Computer Science
, pp. 294-304
-
-
Kushilevitz, E.1
Ishai, Y.2
-
30
-
-
84919799102
-
Use of Network Latency Profiling and Redundancy for Cloud Server Selection
-
Alaska
-
Kwon, M., Dou, Z., Heinzelman, W., Soyata, T., Ba, H., & Shi, J. (2014). Use of Network Latency Profiling and Redundancy for Cloud Server Selection. Proceedings of the 7th IEEE International Conference on Cloud Computing (IEEE CLOUD 2014), (pp. 826-832). Alaska. doi:10.1109/CLOUD.2014.114.
-
(2014)
Proceedings of the 7th IEEE International Conference on Cloud Computing (IEEE CLOUD 2014)
, pp. 826-832
-
-
Kwon, M.1
Dou, Z.2
Heinzelman, W.3
Soyata, T.4
Ba, H.5
Shi, J.6
-
32
-
-
84937054511
-
Cloud-based Secure Health Monitoring: Optimizing Fully-Homomorphic Encryption for Streaming Algorithms
-
Austin, TX
-
Page, A., Kocabas, O., Ames, S., Venkitasubramaniam, M., & Soyata, T. (2014). Cloud-based Secure Health Monitoring: Optimizing Fully-Homomorphic Encryption for Streaming Algorithms. IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA). Austin, TX.
-
(2014)
IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA)
-
-
Page, A.1
Kocabas, O.2
Ames, S.3
Venkitasubramaniam, M.4
Soyata, T.5
-
33
-
-
84937003217
-
Cloud-Based Privacy-Preserving Remote ECG Monitoring and Surveillance
-
PMID:25510621
-
Page, A., Kocabas, O., Soyata, T., Aktas, M., & Couderc, J.-P. (2014). Cloud-Based Privacy-Preserving Remote ECG Monitoring and Surveillance. Annals of Noninvasive Electrocardiology. doi:10.1111/ anec.12204 PMID:25510621.
-
(2014)
Annals of Noninvasive Electrocardiology
-
-
Page, A.1
Kocabas, O.2
Soyata, T.3
Aktas, M.4
Couderc, J.-P.5
-
36
-
-
84946688074
-
AXaaS: Case for Acceleration as a Service
-
Dec, Austin, TX
-
Powers, N., Alling, A., Gyampoh-Vidogah, R., & Soyata, T. (2014, Dec). AXaaS: Case for Acceleration as a Service. IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA). Austin, TX.
-
(2014)
IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA)
-
-
Powers, N.1
Alling, A.2
Gyampoh-Vidogah, R.3
Soyata, T.4
-
37
-
-
0035117861
-
The long QT syndrome
-
PMID:11271945
-
Priori, S. G., Bloise, R., & Crotti, L. (2001). The long QT syndrome. Europace, 3(1), 16-27. doi:10.1053/ eupc.2000.0141 PMID:11271945.
-
(2001)
Europace
, vol.3
, Issue.1
, pp. 16-27
-
-
Priori, S.G.1
Bloise, R.2
Crotti, L.3
-
39
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Adleman, L., & Shamir, A. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. doi:10.1145/359340.359342.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Adleman, L.2
Shamir, A.3
-
40
-
-
84957959610
-
-
SalesForce.com. (2014). Retrieved from http://www.salesforce.com.
-
(2014)
SalesForce.com
-
-
-
42
-
-
2442667617
-
Drug-induced QT interval prolongation: Regulatory perspectives and drug development
-
PMID:15176424
-
Shah, R. (2004). Drug-induced QT interval prolongation: Regulatory perspectives and drug development. Annals of Medicine, 36(s1), 47-52. doi:10.1080/17431380410032445 PMID:15176424.
-
(2004)
Annals of Medicine
, vol.36
, pp. 47-52
-
-
Shah, R.1
-
43
-
-
84894656653
-
Fully homomorphic SIMD operations
-
Smart, N. P., & Vercauteren, F. (2014). Fully homomorphic SIMD operations. Designs, Codes and Cryptography, 71(1), 57-81. doi:10.1007/s10623-012-9720-4.
-
(2014)
Designs, Codes and Cryptography
, vol.71
, Issue.1
, pp. 57-81
-
-
Smart, N.P.1
Vercauteren, F.2
-
44
-
-
84945137823
-
Accelerating Mobile Cloud Computing:A Survey
-
Sep, H. T. Mouftah & B. Kantarci (Eds.), Hershey, PA: IGI Global
-
Soyata, T., Ba, H., Heinzelman, W., Kwon, M., & Shi, J. (2013, Sep). Accelerating Mobile Cloud Computing:A Survey. In H. T. Mouftah & B. Kantarci (Eds.), Communication Infrastructures for Cloud Computing, (pp. 175-197). Hershey, PA: IGI Global.
-
(2013)
Communication Infrastructures for Cloud Computing
, pp. 175-197
-
-
Soyata, T.1
Ba, H.2
Heinzelman, W.3
Kwon, M.4
Shi, J.5
-
46
-
-
0030673679
-
Incorporating Interconnect, Register, and Clock Distribution Delays into the Retiming Process
-
January
-
Soyata, T., Friedman, E. G., & Mulligan, J. H. (1997, January). Incorporating Interconnect, Register, and Clock Distribution Delays into the Retiming Process. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 16(1), 105-120. doi:10.1109/43.559335.
-
(1997)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.16
, Issue.1
, pp. 105-120
-
-
Soyata, T.1
Friedman, E.G.2
Mulligan, J.H.3
-
47
-
-
84872569118
-
COMBAT: Mobile Cloud-based cOmpute/coMmunications infrastructure for BATtlefield applications
-
May, 84030K-13
-
Soyata, T., Muraleedharan, R., Ames, S., Langdon, J. H., Funai, C., Kwon, M., & Heinzelman, W. B. (2012, May). COMBAT: Mobile Cloud-based cOmpute/coMmunications infrastructure for BATtlefield applications. Proceedings of the Society for Photo-Instrumentation Engineers, 8403, 84030K-84030K, 84030K-13. doi:10.1117/12.919146.
-
(2012)
Proceedings of the Society for Photo-Instrumentation Engineers
, vol.8403
, pp. 84030K-84030K
-
-
Soyata, T.1
Muraleedharan, R.2
Ames, S.3
Langdon, J.H.4
Funai, C.5
Kwon, M.6
Heinzelman, W.B.7
-
48
-
-
84866607503
-
Cloud-Vision: Real-Time Face Recognition Using a Mobile-Cloudlet-Cloud Acceleration Architecture
-
Jul, Cappadocia, Turkey
-
Soyata, T., Muraleedharan, R., Funai, C., Kwon, M., & Heinzelman, W. (2012, Jul). Cloud-Vision: Real-Time Face Recognition Using a Mobile-Cloudlet-Cloud Acceleration Architecture. Proceedings of the 17th IEEE Symposium on Computers and Communications (IEEE ISCC 2012), (pp. 59-66). Cappadocia, Turkey. doi:10.1109/ISCC.2012.6249269.
-
(2012)
Proceedings of the 17th IEEE Symposium on Computers and Communications (IEEE ISCC 2012)
, pp. 59-66
-
-
Soyata, T.1
Muraleedharan, R.2
Funai, C.3
Kwon, M.4
Heinzelman, W.5
-
49
-
-
84958023667
-
-
(n.d.), Retrieved from
-
TI-MSP430. (n.d.). Overview for MSP430F1x. Retrieved from http://www.ti.com/lsds/ti/ microcontrollers_16-bit_32-bit/msp/ultra-low_power/msp430f1x/overview.page.
-
Overview for MSP430F1x
-
-
-
50
-
-
84926622431
-
Accessing Big Data in the Cloud Using Mobile Devices
-
Mar, P. R. Chelliah & G. Deka (Eds.), Hershey, PA: IGI Global
-
Wang, H., Liu, W., & Soyata, T. (2014, Mar). Accessing Big Data in the Cloud Using Mobile Devices. In P. R. Chelliah & G. Deka (Eds.), Handbook of Research on Cloud Infrastructures for Big Data Analytics (pp. 444-470). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-5864-6.ch018.
-
(2014)
Handbook of Research on Cloud Infrastructures for Big Data Analytics
, pp. 444-470
-
-
Wang, H.1
Liu, W.2
Soyata, T.3
|