Sciweavers

7200 search results - page 65 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
HICSS
1997
IEEE
103views Biometrics» more  HICSS 1997»
14 years 10 days ago
Technical Challenges of Computing Available Transfer Capability (ATC)
A key concept in the restructuring of the electric power industry is the ability to accurately and rapidly quantify the capabilities of the transmission system. Transmission trans...
Peter W. Sauer
ATAL
2007
Springer
14 years 3 months ago
Embedding Landmarks and Scenes in a Computational Model of Institutions
Over the last decade, institutions have demonstrated that they are a powerful mechanism to make agent interactions more effective, structured, coordinated and efficient. Different...
Owen Cliffe, Marina De Vos, Julian A. Padget
ASIACRYPT
2005
Springer
14 years 2 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov
SIAMNUM
2010
87views more  SIAMNUM 2010»
13 years 3 months ago
A Note on the Computation of All Zeros of Simple Quaternionic Polynomials
Polynomials with quaternionic coefficients located on only one side of the powers (we call them simple polynomials) may have two different types of zeros: isolated and spherical ze...
Drahoslava Janovská, Gerhard Opfer
HPCA
2008
IEEE
14 years 9 months ago
Cluster-level feedback power control for performance optimization
Power control is becoming a key challenge for effectively operating a modern data center. In addition to reducing operating costs, precisely controlling power consumption is an es...
Xiaorui Wang, Ming Chen