Sciweavers

6770 search results - page 150 / 1354
» How GPUs Work
Sort
View
CHI
2010
ACM
15 years 5 months ago
Across boundaries of influence and accountability: the multiple scales of public sector information systems
The use of ICTs in the public sector has long been touted for its potential to transform the institutions that govern and provide social services. The focus, however, has largely ...
Christopher A. Le Dantec, W. Keith Edwards
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 9 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
ICSE
2011
IEEE-ACM
14 years 5 months ago
Pragmatic prioritization of software quality assurance efforts
A plethora of recent work leverages historical data to help practitioners better prioritize their software quality assurance efforts. However, the adoption of this prior work in p...
Emad Shihab
124
Voted
CVPR
2001
IEEE
16 years 4 months ago
Photometric Stereo with General, Unknown Lighting
Work on photometric stereo has shown how to recover the shape and reflectance properties of an object using multiple images taken with a fixed viewpoint and variable lighting cond...
Ronen Basri, David W. Jacobs
109
Voted
CHI
2009
ACM
16 years 2 months ago
Supporting volunteer activities with mobile social software
Many community organizations rely extensively on volunteer work. However, people who wish to help often have difficulties finding the time to volunteer. We are developing mobile s...
Shaun K. Kane, Predrag V. Klasnja