Outsourced

Results: 300



#Item
61OUTSOURCED CIO  Ensuring Sound Sleep for Outsourced Chief Investment Officers Whether you are in the midst of an RFP competition or monthly performance reporting to your clients, you are sure to sleep more soundly

OUTSOURCED CIO Ensuring Sound Sleep for Outsourced Chief Investment Officers Whether you are in the midst of an RFP competition or monthly performance reporting to your clients, you are sure to sleep more soundly

Add to Reading List

Source URL: www.cogencysoft.com

Language: English - Date: 2015-08-07 14:16:18
    62Private Processing of Outsourced Network Functions: Feasibility and Constructions∗ Luca Melis Hassan Jameel Asghar

    Private Processing of Outsourced Network Functions: Feasibility and Constructions∗ Luca Melis Hassan Jameel Asghar

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-01-24 19:12:51
      63Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† †  Richard Shin†

      Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†

      Add to Reading List

      Source URL: www.icir.org

      Language: English - Date: 2015-10-01 22:05:30
      64Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson

      Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson

      Add to Reading List

      Source URL: www.eecs.berkeley.edu

      Language: English - Date: 2015-07-29 20:02:16
      65Secure Outsourced Computation of Iris Matching∗ Marina Blanton and Mehrdad Aliasgari Department of Computer Science and Engineering University of Notre Dame {mblanton,maliasga}@cse.nd.edu

      Secure Outsourced Computation of Iris Matching∗ Marina Blanton and Mehrdad Aliasgari Department of Computer Science and Engineering University of Notre Dame {mblanton,maliasga}@cse.nd.edu

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2012-03-16 21:29:04
        66Privacy Enhanced Access Control for Outsourced Data Sharing Mariana Raykova, Hang Zhao, and Steven M. Bellovin Columbia University, Department of Computer Science, New York, NY, USA, {mariana,zhao,smb}@cs.colu

        Privacy Enhanced Access Control for Outsourced Data Sharing Mariana Raykova, Hang Zhao, and Steven M. Bellovin Columbia University, Department of Computer Science, New York, NY, USA, {mariana,zhao,smb}@cs.colu

        Add to Reading List

        Source URL: fc12.ifca.ai

        Language: English - Date: 2012-02-18 14:34:48
          67OUTSOURCED HUM AN RESOURCES  B EC AU S E S A N I T Y S H O U LD N E V ER B E T H E PR I C E O F S U CC E S S Compliance with Federal and State regulations isn’t just a requirement for California employers: it’s the o

          OUTSOURCED HUM AN RESOURCES B EC AU S E S A N I T Y S H O U LD N E V ER B E T H E PR I C E O F S U CC E S S Compliance with Federal and State regulations isn’t just a requirement for California employers: it’s the o

          Add to Reading List

          Source URL: www.hrideas.com

          Language: English
            68SCExpert™Suite for Logistics Service Providers The Outsourced Distribution market is rapidly growing and with that growth LSP’s are required to differentiate themselves by being able to quickly respond to varying requi

            SCExpert™Suite for Logistics Service Providers The Outsourced Distribution market is rapidly growing and with that growth LSP’s are required to differentiate themselves by being able to quickly respond to varying requi

            Add to Reading List

            Source URL: www.made4net.com

            Language: English - Date: 2010-09-25 14:09:14
              69Oliver Schreiber, itelligence  Bringing clarity to the cloud For a majority of companies, IT is a mission-critical resource and is frequently outsourced to professional service providers. This outsourcing is designed to

              Oliver Schreiber, itelligence Bringing clarity to the cloud For a majority of companies, IT is a mission-critical resource and is frequently outsourced to professional service providers. This outsourcing is designed to

              Add to Reading List

              Source URL: www.itelligence.ag

              Language: English
                70On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun Chunhui Shi

                On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun Chunhui Shi

                Add to Reading List

                Source URL: syssec.kaist.ac.kr

                Language: English - Date: 2012-09-03 21:43:00