Sciweavers

616 search results - page 19 / 124
» Decoding One Out of Many
Sort
View
SYNTHESE
2008
60views more  SYNTHESE 2008»
13 years 8 months ago
Responsibility for believing
Many assume that we can be responsible only what is voluntary. This leads to puzzlement about our responsibility for our beliefs, since beliefs seem not to be voluntary. I argue ag...
Pamela Hieronymi
MICRO
1995
IEEE
102views Hardware» more  MICRO 1995»
13 years 12 months ago
Zero-cycle loads: microarchitecture support for reducing load latency
Untolerated load instruction latencies often have a significant impact on overall program performance. As one means of mitigating this effect, we present an aggressive hardware-b...
Todd M. Austin, Gurindar S. Sohi
IISWC
2006
IEEE
14 years 2 months ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...
BCSHCI
2008
13 years 9 months ago
Designing for people who do not read easily
Many people do not read easily for all sorts of reasons: social and cultural, because of impairments, or because of their context. Even in the area of impairments, design for peop...
Caroline Jarrett, Katie Grant, B. L. William Wong,...
IACR
2011
125views more  IACR 2011»
12 years 8 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...