Sciweavers

6110 search results - page 1194 / 1222
» Approximate Computing
Sort
View
ISBMS
2010
Springer
15 years 2 months ago
A Theoretical Model for RF Ablation of Kidney Tissue and Its Experimental Validation
Radio-frequency (RF) ablation is a minimal invasive thermal therapy, currently considered as an alternative to surgery to eradicate small solid kidney tumors. Our aim is to underst...
Mihaela Pop, Sean R. H. Davidson, Mark Gertner, Mi...
64
Voted
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 2 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
LICS
2002
IEEE
15 years 2 months ago
Little Engines of Proof
The automated construction of mathematical proof is a basic activity in computing. Since the dawn of the field of automated reasoning, there have been two divergent schools of tho...
Natarajan Shankar
WISE
2002
Springer
15 years 2 months ago
Applying the Site Information to the Information Retrieval from the Web
In recent years, several information retrieval methods using information about the Web-links are developed, such as HITS and Trawling. In order to analyze the Web-links dividing i...
Yasuhito Asano, Hiroshi Imai, Masashi Toyoda, Masa...
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
15 years 2 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
« Prev « First page 1194 / 1222 Last » Next »