Sciweavers

6770 search results - page 1095 / 1354
» How GPUs Work
Sort
View
P2P
2008
IEEE
14 years 5 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
14 years 5 months ago
Query-Aware Sampling for Data Streams
Data Stream Management Systems are useful when large volumes of data need to be processed in real time. Examples include monitoring network traffic, monitoring financial transacti...
Theodore Johnson, S. Muthukrishnan, Vladislav Shka...
IROS
2007
IEEE
175views Robotics» more  IROS 2007»
14 years 5 months ago
Simulation and weights of multiple cues for robust object recognition
Reliable recognition of objects is an important capabaility in the progress towards getting agents to accomplish and assist in a variety of useful tasks such as search and rescue ...
Sarah Aboutalib, Manuela M. Veloso
ISCA
2007
IEEE
110views Hardware» more  ISCA 2007»
14 years 5 months ago
Late-binding: enabling unordered load-store queues
Conventional load/store queues (LSQs) are an impediment to both power-efficient execution in superscalar processors and scaling to large-window designs. In this paper, we propose...
Simha Sethumadhavan, Franziska Roesner, Joel S. Em...
SP
2007
IEEE
14 years 5 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
« Prev « First page 1095 / 1354 Last » Next »