Sciweavers

13 search results - page 2 / 3
» damon 2006
Sort
View
DAMON
2006
Springer
13 years 8 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
DAMON
2006
Springer
13 years 8 months ago
Processing-in-memory technology for knowledge discovery algorithms
The goal of this work is to gain insight into whether processingin-memory (PIM) technology can be used to accelerate the performance of link discovery algorithms, which represent ...
Jafar Adibi, Tim Barrett, Spundun Bhatt, Hans Chal...
CSREAPSC
2006
13 years 6 months ago
Sensor Network Lab Exercises Using TinyOS and MicaZ Motes
- MIT Technology Review lists sensor networks as one of "Ten Emerging Technologies That Will Change the World" [1]. This paper describes three lab exercises that are suit...
Jens Mache, Chris Allick, John Charnas, Alex Hickm...
JEI
2010
171views more  JEI 2010»
13 years 3 months ago
Most apparent distortion: full-reference image quality assessment and the role of strategy
The mainstream approach to image quality assessment has centered around accurately modeling the single most relevant strategy employed by the human visual system (HVS) when judging...
Eric C. Larson, Damon M. Chandler
PUC
2008
109views more  PUC 2008»
13 years 4 months ago
Adapting paper prototyping for designing user interfaces for multiple display environments
A multiple display environment (MDE) networks personal and shared devices to form a virtual workspace, and designers are just beginning to grapple with the challenges of developing...
Brian P. Bailey, Jacob T. Biehl, Damon J. Cook, He...