Sciweavers

Share
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
7 years 6 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
NN
1998
Springer
8 years 10 months ago
A neural model of the saccade generator in the reticular formation
: 397 Words 20 Text Pages 5 Appendix Pages 5 Reference Pages 5 Table and Figure Caption Pages 17 Figures, 1 Table Running Title: Saccade Generator Model xSupported in part by the D...
Gregory Gancarz, Stephen Grossberg
JISE
1998
84views more  JISE 1998»
8 years 10 months ago
Determining the Idle Time of a Tiling: New Results
In the framework of perfect loop nests with uniform dependences, tiling has been extensively studied as a source-to-source program transformation. We build upon recent results by ...
Frederic Desprez, Jack Dongarra, Fabrice Rastello,...
AAMAS
2008
Springer
8 years 10 months ago
Using quantitative models to search for appropriate organizational designs
As the scale and scope of distributed and multi-agent systems grow, it becomes increasingly important to design and manage the participants' interactions. The potential for b...
Bryan Horling, Victor R. Lesser
NIPS
1989
8 years 11 months ago
The Cascade-Correlation Learning Architecture
Cascade-Correlation is a new architecture and supervised learning algorithm for artificial neural networks. Instead of just adjusting the weights in a network of fixed topology,...
Scott E. Fahlman, Christian Lebiere
PARCO
1997
8 years 11 months ago
Scheduling Block-Cyclic Array Redistribution
This article is devoted to the run-time redistribution of arrays that are distributed in a blockcyclic fashion over a multidimensional processor grid. While previous studies have ...
Frederic Desprez, Jack Dongarra, Antoine Petitet, ...
LREC
2008
122views Education» more  LREC 2008»
8 years 11 months ago
Applying Automated Metrics to Speech Translation Dialogs
Over the past five years, the Defense Advanced Research Projects Agency (DARPA) has funded development of speech translation systems for tactical applications. A key component of ...
Sherri L. Condon, Jon Phillips, Christy Doran, Joh...
FPCA
1995
9 years 1 months ago
Abstract Models of Memory Management
Models of Memory Management Greg Morrisett Matthias Felleisen Robert Harper January 1995 CMU{CS{95{110 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Al...
J. Gregory Morrisett, Matthias Felleisen, Robert H...
FGR
2004
IEEE
102views Biometrics» more  FGR 2004»
9 years 2 months ago
Towards a One-Way American Sign Language Translator
Inspired by the Defense Advanced Research Projects Agency's (DARPA) recent successes in speech recognition, we introduce a new task for sign language recognition research: a ...
R. Martin McGuire, Jose L. Hernandez-Rebollar, Tha...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
9 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
books