Sciweavers

24529 search results - page 407 / 4906
» Computing on Authenticated Data
Sort
View
146
Voted
ICAIL
2005
ACM
15 years 10 months ago
Computational Law
Computational law is an approach to automated legal reasoning focusing on semantically rich laws, regulations, contract terms, and business rules in the context of electronicallym...
Nathaniel Love, Michael R. Genesereth
LCR
1998
Springer
109views System Software» more  LCR 1998»
15 years 9 months ago
Expressing Irregular Computations in Modern Fortran Dialects
Abstract. Modern dialects of Fortran enjoy wide use and good support on highperformance computers as performance-oriented programming languages. By providing the ability to express...
Jan Prins, Siddhartha Chatterjee, Martin Simons
SEC
2004
15 years 6 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
130
Voted
JMIV
2010
78views more  JMIV 2010»
14 years 11 months ago
Unified Computation of Strict Maximum Likelihood for Geometric Fitting
A new numerical scheme is presented for strictly computing maximum likelihood (ML) of geometric fitting problems. Intensively studied in the past are those methods that first tran...
Kenichi Kanatani, Yasuyuki Sugaya
CHI
2011
ACM
14 years 8 months ago
MusEEGk: a brain computer musical interface
We present a novel integration of a brain-computer interface (BCI) with a music step sequencer composition program. Previous BCIs that utilize EEG data to form music provide users...
Yee Chieh "Denise" Chew, Eric Caspary