Sciweavers

7504 search results - page 274 / 1501
» Computing with Action Potentials
Sort
View
COMPSAC
2011
IEEE
14 years 2 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
156
Voted
ICDCS
2011
IEEE
14 years 2 months ago
Smart Redundancy for Distributed Computation
Many distributed software systems allow participation by large numbers of untrusted, potentially faulty components on an open network. As faults are inevitable in this setting, th...
Yuriy Brun, George Edwards, Jae Young Bang, Nenad ...
94
Voted
MICCAI
2005
Springer
16 years 3 months ago
Computer-Assisted Ankle Joint Arthroplasty Using Bio-engineered Autografts
Bio-engineered cartilage has made substantial progress over the last years. Preciously few cases, however, are known where patients were actually able to benefit from these develop...
Rudolf Sidler, Wolfgang Köstler, Thibaut Bard...
108
Voted
CHI
2008
ACM
16 years 2 months ago
Human-aided computing: utilizing implicit human processing to classify images
In this paper, we present Human-Aided Computing, an approach that uses an electroencephalograph (EEG) device to measure the presence and outcomes of implicit cognitive processing,...
Pradeep Shenoy, Desney S. Tan
128
Voted
CHI
2005
ACM
16 years 2 months ago
Automating the detection of breaks in continuous user experience with computer games
This paper describes an approach towards automating the identification of design problems with three-dimensional mediated or gaming environments through the capture and query of u...
Tim Marsh, Kiyoung Yang, Cyrus Shahabi, Wee Ling W...