Sciweavers

1806 search results - page 330 / 362
» Some Functions Computable with a Fused-Mac
Sort
View
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
LCTRTS
2005
Springer
14 years 2 months ago
Generation of permutations for SIMD processors
Short vector (SIMD) instructions are useful in signal processing, multimedia, and scientific applications. They offer higher performance, lower energy consumption, and better res...
Alexei Kudriavtsev, Peter M. Kogge
FSTTCS
2004
Springer
14 years 2 months ago
Adaptive Stabilization of Reactive Protocols
A self-stabilizing distributed protocol can recover from any state-corrupting fault. A self-stabilizing protocol is called adaptive if its recovery time is proportional to the numb...
Shay Kutten, Boaz Patt-Shamir
PCM
2004
Springer
118views Multimedia» more  PCM 2004»
14 years 2 months ago
Reach-Through-the-Screen: A New Metaphor for Remote Collaboration
For some years, our group at FX Palo Alto Laboratory has been developing technologies to support meeting recording, collaboration, and videoconferencing. This paper presents severa...
Jonathan Foote, Qiong Liu, Don Kimber, Patrick Chi...
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
14 years 1 months ago
IRTL (Information Resource Transaction Layer) Middleware Design for P2P and Open GRID Services
In this paper we present an IRTL (Information Resource Transaction Layer) middleware architecture that addresses some of the important technical challenges associated with heterog...
Junseok Hwang, Praveen Aravamudham, Elizabeth D. L...