598 research outputs found

    Annual Report 2006: Space

    Get PDF
    Space - This 2006 Annual Report records the achievements, outreach activities, and student honors work of the Eastern Illinois University\u27s Lumpkin College of Business and Applied Sciences. It also includes reports from the School of Business, the School of Family and Consumer Science, the School of Technology, and the department of Military Science.https://thekeep.eiu.edu/lumpkin_annualreports/1013/thumbnail.jp

    Volume 2014 - Issue 3 - Summer, 2014

    Get PDF
    https://scholar.rose-hulman.edu/rose_echoes/1088/thumbnail.jp

    Cryptography for Big Data Security

    Get PDF
    As big data collection and analysis becomes prevalent in today’s computing environments there is a growing need for techniques to ensure security of the collected data. To make matters worse, due to its large volume and velocity, big data is commonly stored on distributed or shared computing resources not fully controlled by the data owner. Thus, tools are needed to ensure both the confidentiality of the stored data and the integrity of the analytics results even in untrusted environments. In this chapter, we present several cryptographic approaches for securing big data and discuss the appropriate use scenarios for each. We begin with the problem of securing big data storage. We first address the problem of secure block storage for big data allowing data owners to store and retrieve their data from an untrusted server. We present techniques that allow a data owner to both control access to their data and ensure that none of their data is modified or lost while in storage. However, in most big data applications, it is not sufficient to simply store and retrieve one’s data and a search functionality is necessary to allow one to select only the relevant data. Thus, we present several techniques for searchable encryption allowing database- style queries over encrypted data. We review the performance, functionality, and security provided by each of these schemes and describe appropriate use-cases. However, the volume of big data often makes it infeasible for an analyst to retrieve all relevant data. Instead, it is desirable to be able to perform analytics directly on the stored data without compromising the confidentiality of the data or the integrity of the computation results. We describe several recent cryptographic breakthroughs that make such processing possible for varying classes of analytics. We review the performance and security characteristics of each of these schemes and summarize how they can be used to protect big data analytics especially when deployed in a cloud setting. We hope that the exposition in this chapter will raise awareness of the latest types of tools and protections available for securing big data. We believe better understanding and closer collaboration between the data science and cryptography communities will be critical to enabling the future of big data processing

    Columbia Chronicle (09/06/2005)

    Get PDF
    Student newspaper from September 6, 2005 entitled The Columbia Chronicle. This issue is 36 pages and is listed as Volume 40, Number 1. Cover story: 170 books ruined in library flood Editor-in-Chief: Jeffrey Dannahttps://digitalcommons.colum.edu/cadc_chronicle/1648/thumbnail.jp

    Lawrence Today, Volume 85, Number 4, Summer 2005

    Get PDF
    https://lux.lawrence.edu/alumni_magazines/1056/thumbnail.jp

    Benchmarking Learned Indexes

    Full text link
    Recent advancements in learned index structures propose replacing existing index structures, like B-Trees, with approximate learned models. In this work, we present a unified benchmark that compares well-tuned implementations of three learned index structures against several state-of-the-art "traditional" baselines. Using four real-world datasets, we demonstrate that learned index structures can indeed outperform non-learned indexes in read-only in-memory workloads over a dense array. We also investigate the impact of caching, pipelining, dataset size, and key size. We study the performance profile of learned index structures, and build an explanation for why learned models achieve such good performance. Finally, we investigate other important properties of learned index structures, such as their performance in multi-threaded systems and their build times

    Alfred P. Sloan Foundation - 2005 Annual Report

    Get PDF
    Contains program information, grantee profiles, grants list, and financial statements
    • …
    corecore