Sciweavers

7596 search results - page 178 / 1520
» Challenges in forensic computing
Sort
View
129
Voted
ICASSP
2011
IEEE
14 years 7 months ago
An efficient rank-deficient computation of the Principle of Relevant Information
One of the main difficulties in computing information theoretic learning (ITL) estimators is the computational complexity that grows quadratically with data. Considerable amount ...
Luis Gonzalo Sánchez Giraldo, José C...
136
Voted
CHI
2011
ACM
14 years 7 months ago
Opportunities for computing technologies to support healthy sleep behaviors
Getting the right amount of quality sleep is a key aspect of good health, along with a healthy diet and regular exercise. Human-computer interaction (HCI) researchers have recentl...
Eun Kyoung Choe, Sunny Consolvo, Nathaniel F. Wats...
155
Voted
PERCOM
2011
ACM
14 years 6 months ago
Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing
Abstract—The adaptive ubiquitous services, which dynamically adapt behaviors to requirements and contexts, are one of the major challenges in the ubiquitous computing. To facilit...
Koichi Egami, Shinsuke Matsumoto, Masahide Nakamur...
118
Voted
CCS
2009
ACM
15 years 10 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
139
Voted
CLUSTER
2009
IEEE
15 years 10 months ago
Topics on measuring real power usage on high performance computing platforms
—Power has recently been recognized as one of the major obstacles in fielding a Peta-FLOPs class system. To reach Exa-FLOPs, the challenge will certainly be compounded. In this ...
James H. Laros, Kevin T. Pedretti, Suzanne M. Kell...