Sciweavers

15792 search results - page 3020 / 3159
» Computational Abstraction Steps
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 10 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JUCS
2008
166views more  JUCS 2008»
13 years 10 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
JMM2
2006
138views more  JMM2 2006»
13 years 10 months ago
A Framework for Constructing Real-time Immersive Environments for Training Physical Activities
Abstract-- This paper describes a framework for constructing a three-dimensional immersive environment that can be used for training physical activities. The system is designed to ...
Sang-Hack Jung, Ruzena Bajcsy
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
13 years 10 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
JUCS
2006
112views more  JUCS 2006»
13 years 10 months ago
A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip
Abstract: Advances in technology now make it possible to integrate hundreds of cores (e.g. general or special purpose processors, embedded memories, application specific components...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi
« Prev « First page 3020 / 3159 Last » Next »