Sciweavers

266 search results - page 34 / 54
» General Homomorphic Overloading
Sort
View
SIAMCOMP
2011
13 years 2 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
WWW
2008
ACM
14 years 8 months ago
A domain-specific language for the model-driven construction of advanced web-based dialogs
Complex dialogs with comprehensive underlying data models are gaining increasing importance in today's Web applications. This in turn accelerates the need for highly dynamic ...
Patrick Freudenstein, Martin Nussbaumer, Florian A...
ICFP
2009
ACM
14 years 8 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
CHI
2007
ACM
14 years 7 months ago
GUIDe: gaze-enhanced UI design
The GUIDe (Gaze-enhanced User Interface Design) project in the HCI Group at Stanford University explores how gaze information can be effectively used as an augmented input in addi...
Manu Kumar, Terry Winograd
DATE
2009
IEEE
86views Hardware» more  DATE 2009»
14 years 2 months ago
A link arbitration scheme for quality of service in a latency-optimized network-on-chip
Abstract—Networks-on-chip (NoC) for general-purpose multiprocessors require quality of service mechanisms to allow realtime streaming applications to be executed along with laten...
Jonas Diemer, Rolf Ernst