Sciweavers

8655 search results - page 323 / 1731
» Challenges for Trusted Computing
Sort
View
CGF
2006
146views more  CGF 2006»
15 years 3 months ago
Principles and Applications of Computer Graphics in Medicine
The medical domain provides excellent opportunities for the application of computer graphics, visualization and virtual environments, with the potential to help improve healthcare...
F. P. Vidal, Fernando Bello, Ken W. Brodlie, Nigel...
115
Voted
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 3 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
148
Voted
CHI
2011
ACM
14 years 7 months ago
Proxemic interactions in ubiquitous computing ecologies
An important challenge in ubiquitous computing (ubicomp) is to create techniques that allow people to seamlessly and naturally connect to and interact with the increasing number o...
Nicolai Marquardt
139
Voted
COMPSAC
2011
IEEE
14 years 3 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
CORR
2012
Springer
281views Education» more  CORR 2012»
13 years 11 months ago
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization
Compiling Bayesian networks (BNs) to junction trees and performing belief propagation over them is among the most prominent approaches to computing posteriors in BNs. However, bel...
Lu Zheng, Ole J. Mengshoel, Jike Chong