Sciweavers

2678 search results - page 379 / 536
» Voting in social networks
Sort
View
DSN
2009
IEEE
14 years 5 months ago
Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems
The threat of soft error induced system failure in high performance computing systems has become more prominent, as we adopt ultra-deep submicron process technologies. In this pap...
Naga Durga Prasad Avirneni, Viswanathan Subramania...
NDSS
2008
IEEE
14 years 4 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
TNN
1998
121views more  TNN 1998»
13 years 10 months ago
Detection of mines and minelike targets using principal component and neural-network methods
— This paper introduces a new system for real-time detection and classification of arbitrarily scattered surface-laid mines from multispectral imagery data of a minefield. The ...
Xi Miao, Mahmood R. Azimi-Sadjadi, Bin Tan, A. C. ...
PVLDB
2011
13 years 5 months ago
Hyper-local, directions-based ranking of places
Studies find that at least 20% of web queries have local intent; and the fraction of queries with local intent that originate from mobile properties may be twice as high. The eme...
Petros Venetis, Hector Gonzalez, Christian S. Jens...
VL
2007
IEEE
122views Visual Languages» more  VL 2007»
14 years 4 months ago
Children as Unwitting End-User Programmers
Children who are active on the internet are performing significant design and programming activity without realising it, in the course of hacking little animations, game scripts a...
Marian Petre, Alan F. Blackwell