نتایج جستجو برای: pir i bakran mausoleum

تعداد نتایج: 1040144  

2011

We present PRISM, a privacy-preserving scheme for word search in cloud computing. Assuming a curious cloud provider, privacy of data stored in the cloud becomes an issue. The main challenge in the context of cloud computing is to design a scheme that achieves privacy while preserving the efficiency of cloud computing. Main approaches like simple encryption, Private Information Retrieval (PIR) a...

2017
Ran Canetti Justin Holmgren Silas Richelson

Private Information Retrieval (PIR) allows a client to obtain data from a public database without disclosing the locations accessed. Traditionally, the stress is on preserving sublinear work for the client, while the server’s work is taken to inevitably be at least linear in the database size. Beimel, Ishai and Malkin (JoC 2004) show PIR schemes where, following a linear-work preprocessing stag...

Journal: :IACR Cryptology ePrint Archive 2012
Travis Mayberry Erik-Oliver Blass Agnes Hui Chan

Private Information Retrieval (PIR) allows a user to retrieve bits from a database while hiding the user’s access pattern. However, the practicality of PIR in a real-world cloud computing setting has recently been questioned. In such a setting, PIR’s enormous computation and communication overhead is expected to outweigh the cost saving advantages of cloud computing. In this paper, we first exa...

2018
Shuyuan Shen Hai Yu Xiaobai Liu Yunhui Liu Jian Zheng Ping Wang Wei Gong Jiajia Chen Lini Zhao Yixue Xue

The blood-tumor barrier (BTB) restricts the efficient delivery of anti-glioma drugs to cranial glioma tissues. Increased BTB permeability may allow greater delivery of the therapeutic agents. Increasing evidence has revealed that PIWI proteins and PIWI-interacting RNAs (piRNAs) play an important role in tumor progression. However, whether PIWI proteins and piRNAs regulate BTB permeability remai...

Journal: :CoRR 2017
Zhifang Zhang Jingke Xu

Suppose a database containing M records is replicated across N servers, and a user wants to privately retrieve one record by accessing the servers such that identity of the retrieved record is secret against any up to T servers. A scheme designed for this purpose is called a private information retrieval (PIR) scheme. In practice, capacity-achieving and small sub-packetization are both desired ...

Journal: :Nucleic acids research 1999
John S. Garavelli

Because the number of post-translational modifications requiring standardized annotation in the PIR-International Protein Sequence Database was large and steadily increasing, a database of protein structure modifications was constructed in 1993 to assist in producing appropriate feature annotations for covalent binding sites, modified sites and cross-links. In 1995 RESID was publicly released a...

Journal: :CoRR 2018
Karim A. Banawan Sennur Ulukus

We consider the problem of private information retrieval through wiretap channel II (PIR-WTC-II). In PIR-WTC-II, a user wants to retrieve a single message (file) privately out of M messages, which are stored in N replicated and non-communicating databases. An external eavesdropper observes a fraction μn (of its choice) of the traffic exchanged between the nth database and the user. In addition ...

Journal: :هنرهای تجسمی 0
سید محمد فدوی دانشیاردانشکده هنرهای تجسمی، پردیس هنرهای زیبا، دانشگاه تهران، تهران، ایران. حامد زارع کارشناس ارشد گرافیک، دانشکده هنرهای تجسمی، پردیس هنرهای زیبا، دانشگاه تهران

iran central plateau is considered to be historically important due to the remained religious, historical, and cultural locations survived from ages ago. abarkuh, as one of the towns in yazd province, and the one which is 140 kilometers far from the center of the province, is considered to be historically important. moreover, this city is geographically related to esfahan and shiraz. since this...

2002
Amos Beimel Yuval Ishai Eyal Kushilevitz Jean-François Raymond

Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database while hiding the identity of the item being retrieved. Specifically, in information-theoretic, k-server PIR protocols the database is replicated among k servers, and each server learns nothing about the item the user retrieves. The cost of such protocols is measured by the communication complexity...

2011
Pavel Krenek

This document describes how to implement a passive infrared (PIR) motion detector using Freescale's low-cost RS08KA microcontroller family. The base function of this design is to switch on appliances, especially lighting, in response to movement. The main idea behind this solution is to replace the common analog motion detector with an ultra low-cost digital design, based on the MC9RS08KA1. The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید