Sciweavers

878 search results - page 135 / 176
» What's ahead in computer design
Sort
View
CHI
2008
ACM
14 years 9 months ago
Usability evaluation considered harmful (some of the time)
Current practice in Human Computer Interaction as encouraged by educational institutes, academic review processes, and institutions with usability groups advocate usability evalua...
Saul Greenberg, William Buxton
ICS
2011
Tsinghua U.
13 years 7 days ago
An idiom-finding tool for increasing productivity of accelerators
Suppose one is considering purchase of a computer equipped with accelerators. Or suppose one has access to such a computer and is considering porting code to take advantage of the...
Laura Carrington, Mustafa M. Tikir, Catherine Olsc...
MICCAI
2004
Springer
14 years 9 months ago
: Multi-subject Registration for Unbiased Statistical Atlas Construction
This paper introduces a new similarity measure designed to bring a population of segmented subjects into alignment in a common coordinate system. Our metric aligns each subject wit...
Mathieu De Craene, Aloys du Bois d'Aische, Beno&ic...
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
14 years 3 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
ACNS
2006
Springer
92views Cryptology» more  ACNS 2006»
14 years 2 months ago
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlapping shadow images without additional computation...
Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen