Sciweavers

21324 search results - page 65 / 4265
» Making the case for computing
Sort
View
FOCS
2003
IEEE
14 years 3 months ago
Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds
We consider the problem of constructing a general protocol for secure two-party computation in a way that preserves security under concurrent composition. In our treatment, we foc...
Rafael Pass, Alon Rosen
CF
2007
ACM
13 years 12 months ago
Computational and storage power optimizations for the O-GEHL branch predictor
In recent years, highly accurate branch predictors have been proposed primarily for high performance processors. Unfortunately such predictors are extremely energy consuming and i...
Kaveh Aasaraai, Amirali Baniasadi, Ehsan Atoofian
DILS
2010
Springer
13 years 11 months ago
Search Computing: Integrating Ranked Data in the Life Sciences
Search computing has been proposed to support the integration of the results of search engines with other data and computational resources. In essence, in search computing, search ...
Marco Masseroli, Norman W. Paton, Giorgio Ghisalbe...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
Service Level Agreement (SLA) in Utility Computing Systems
In recent years, extensive research has been conducted in the area of Service Level Agreement (SLA) for utility computing systems. An SLA is a formal contract used to guarantee th...
Linlin Wu, Rajkumar Buyya
ESA
2004
Springer
117views Algorithms» more  ESA 2004»
14 years 3 months ago
Classroom Examples of Robustness Problems in Geometric Computations
The algorithms of computational geometry are designed for a machine model with exact real arithmetic. Substituting floating-point arithmetic for the assumed real arithmetic may c...
Lutz Kettner, Kurt Mehlhorn, Sylvain Pion, Stefan ...