Sciweavers

3134 search results - page 57 / 627
» Computing full disjunctions
Sort
View
CORR
2002
Springer
187views Education» more  CORR 2002»
13 years 9 months ago
Answer Sets for Consistent Query Answering in Inconsistent Databases
A relational database is inconsistent if it does not satisfy a given set of integrity constraints. Nevertheless, it is likely that most of the data in it is consistent with the co...
Marcelo Arenas, Leopoldo E. Bertossi, Jan Chomicki
MOBICOM
2000
ACM
14 years 2 months ago
W-mail: an electronic mail system for wearable computing environments
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
Hirotaka Ueda, Masahiko Tsukamoto, Shojiro Nishio
ISWC
1998
IEEE
14 years 2 months ago
Speaking and Listening on the Run: Design for Wearable Audio Computing
The use of speech and auditory interaction on wearable computers can provide an awareness of events and personal messages, without requiring one's full attention or disruptin...
Nitin "Nick" Sawhney, Chris Schmandt
EUROPAR
1995
Springer
14 years 1 months ago
Bounds on Memory Bandwidth in Streamed Computations
The growing disparity between processor and memory speeds has caused memory bandwidth to become the performance bottleneck for many applications. In particular, this performance ga...
Sally A. McKee, William A. Wulf, Trevor C. Landon
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 4 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas