نتایج جستجو برای: مدل ram

تعداد نتایج: 128448  

Journal: :Animal reproduction science 2000
S Salamon W M Maxwell

Storage of ram semen in liquid and frozen state, the diluents used for both methods, processing, cooling, freezing and thawing of semen are reviewed. Factors influencing the fertility of stored semen and methods used for improvement are discussed, and fertility results of long-term frozen stored ram semen are also given.

Journal: :PoPETs 2017
Joshua Gancher Adam Groce Alex Ledger

We present the idea of externally verifiable oblivious RAM (ORAM). Our goal is to allow a client and server carrying out an ORAM protocol to have disputes adjudicated by a third party, allowing for the enforcement of penalties against an unreliable or malicious server. We give a security definition that guarantees protection not only against a malicious server but also against a client making f...

2016
Sameer Wagh Paul Cuff Prateek Mittal

State-of-the-art mechanisms for oblivious RAM (ORAM) suffer from significant bandwidth overheads (greater than 100x) that impact the throughput and latency of memory accesses. This renders their deployment in high-performance and bandwidth-constrained applications difficult, motivating the design of lowoverhead approaches for memory access obfuscation. We introduce and formalize the notion of a...

2013
Nachum Dershowitz Evgenia Falkovich

We show that the programs of any classical (as opposed to parallel or interactive) computation model or programming language that satisfies natural postulates of effectiveness (which specialize Gurevich’s Sequential Postulates) can be simulated by a random access machine (RAM) with only constant overhead. In essence, the effectiveness postulates assert the following: states can be represented a...

Journal: :IACR Cryptology ePrint Archive 2015
Dana Dachman-Soled Chang Liu Charalampos Papamanthou Elaine Shi Uzi Vishkin

Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untrusted memory, such that the access patterns reveal nothing about sensitive data. ORAM is known to have broad applications in secure processor design and secure multi-party computation for big data. Unfortunately, due to a well-known logarithmic lower bound by Goldreich and Ostrovsky (Journal of th...

2010
Bogdan Carbunar Radu Sion

We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality and data access privacy, and, for data retention, the server ensures client access WORM semantics. In general simple confidentiality a...

Journal: :IACR Cryptology ePrint Archive 2015
Tarik Moataz Travis Mayberry Erik-Oliver Blass

There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, which achieves O(1) communication overhead with polylogarithmic server computation. However, it has a number of drawbacks. It requires a very large block size of B = Ω(log N), with large constants. Although it needs only...

Journal: :IACR Cryptology ePrint Archive 2015
Yael Tauman Kalai Omer Paneth

In the setting of cloud computing a user wishes to delegate its data, as well as computations over this data, to a cloud provider. Each computation may read and modify the data, and these modifications should persist between computations. Minding the computational resources of the cloud, delegated computations are modeled as RAM programs. In particular, the delegated computations’ running time ...

2004
Mahesh Kallahalla Mustafa Uysal Ram Swaminathan David E. Lowell Mike Wray Tom Christian Nigel Edwards Chris I. Dalton Frederic Gittler

T ypical enterprise IT environments consist of numerous independent and distributed servers, networks, and storage devices. To improve efficiency, customers increasingly seek to bring these disparate systems under one umbrella of control. Utility computing facilitates this effort by aggregating such systems into a single, centrally managed pool of resources. To adequately address user expectati...

سید علی جوزی٭ سید مسعود منوری هدا خسروانی

هدف از انجام این تحقیق ارزیابی ریسک سد رودبار لرستان به‌روش تلفیقی تصمیم‌گیری چندشاخصه و مدل RAM-D است. فهرستی از عوامل ریسک‌های محیط‌زیستی تهیه شد و در قالب پرسشنامه در اختیار کارشناسان حوزه سد و محیط‌زیست قرار گرفت و در نتیجه تعداد 33 عامل ریسک شناسایی شد. نتایج حاصل از پرسشنامه‌ها با روش TOPSIS مورد تجزیه و تحلیل و اولویت‌بندی قرار گرفت و سه ریسک تأثیر بر منظر و گردشگری، دفع ضایعات و تأثیر ب...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید