Sciweavers

3733 search results - page 657 / 747
» Logics of communication and change
Sort
View
STACS
1992
Springer
14 years 2 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
CHI
2007
ACM
14 years 2 months ago
Follow the reader: filtering comments on slashdot
Large-scale online communities need to manage the tension between critical mass and information overload. Slashdot is a news and discussion site that has used comment rating to al...
Cliff Lampe, Erik W. Johnston, Paul Resnick
LCTRTS
2010
Springer
14 years 11 hour ago
An efficient code update scheme for DSP applications in mobile embedded systems
DSP processors usually provide dedicated address generation units (AGUs) to assist address computation. By carefully allocating variables in the memory, DSP compilers take advanta...
Weijia Li, Youtao Zhang
CIDR
2003
164views Algorithms» more  CIDR 2003»
13 years 11 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng
NIPS
2004
13 years 11 months ago
Bayesian inference in spiking neurons
We propose a new interpretation of spiking neurons as Bayesian integrators accumulating evidence over time about events in the external world or the body, and communicating to oth...
Sophie Deneve