Sciweavers

21324 search results - page 52 / 4265
» Making the case for computing
Sort
View
HICSS
1999
IEEE
110views Biometrics» more  HICSS 1999»
14 years 1 days ago
Voting before Discussing: Computer Voting as Social Communication
This paper presents a case study on the use of an alternative method of computer support to that normally used, one that uses voting as a tool for social rather than rational choi...
Brian Whitworth, Robert J. McQueen
MICRO
2003
IEEE
152views Hardware» more  MICRO 2003»
14 years 1 months ago
A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor
Single-event upsets from particle strikes have become a key challenge in microprocessor design. Techniques to deal with these transient faults exist, but come at a cost. Designers...
Shubhendu S. Mukherjee, Christopher T. Weaver, Joe...
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
ARCS
2005
Springer
14 years 1 months ago
A File System for System Programming in Ubiquitous Computing
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task invol...
Christian Decker, Michael Beigl, Albert Krohn
NIPS
1998
13 years 9 months ago
Computational Differences between Asymmetrical and Symmetrical Networks
Symmetrically connected recurrent networks have recently been used as models of a host of neural computations. However, biological neural networks have asymmetrical connections, at...
Zhaoping Li, Peter Dayan