Sciweavers

13969 search results - page 25 / 2794
» Child computer interaction
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
IACR
2011
196views more  IACR 2011»
13 years 11 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
PPOPP
2011
ACM
14 years 2 months ago
Programming the memory hierarchy revisited: supporting irregular parallelism in sequoia
We describe two novel constructs for programming parallel machines with multi-level memory hierarchies: call-up, which allows a child task to invoke computation on its parent, and...
Michael Bauer, John Clark, Eric Schkufza, Alex Aik...
CGA
1998
14 years 11 months ago
Computer Vision for Interactive Computer Graphics
William T. Freeman, David B. Anderson, Paul A. Bea...
PERCOM
2004
ACM
15 years 11 months ago
Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer Interaction
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
D. Scott McCrickard, Christa M. Chewar