Sciweavers

7489 search results - page 158 / 1498
» Challenges for biologically-inspired computing
Sort
View
COMPSAC
2011
IEEE
14 years 5 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
CHI
2003
ACM
16 years 5 months ago
Mobile computing in the retail arena
Although PDAs typically run applications in a "standalone" mode, they are increasingly equipped with wireless communications, which makes them useful in new domains. Thi...
Erica Newcomb, Toni Pashley, John T. Stasko
OSDI
2008
ACM
16 years 5 months ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack
ICPR
2010
IEEE
16 years 4 days ago
Hand Pointing Estimation for Human Computer Interaction Based on Two Orthogonal-Views
Hand pointing has been an intuitive gesture for human interaction with computers. Big challenges are still posted for accurate estimation of finger pointing direction in a 3D spac...
Kaoning Hu, Shaun Canavan, Lijun Yin
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 12 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...