Sciweavers

24188 search results - page 309 / 4838
» Computing on Encrypted Data
Sort
View
157
Voted
ITICSE
1996
ACM
15 years 8 months ago
An interactive environment for the teaching of computer architecture
The operation of a computer can be conceptualised as a large, discrete and constantly changing set of state information. However even for the simplest uni-processor the data set o...
Paul S. Coe, Laurence M. Williams, Roland N. Ibbet...
PPOPP
2010
ACM
16 years 1 months ago
Data transformations enabling loop vectorization on multithreaded data parallel architectures
Loop vectorization, a key feature exploited to obtain high performance on Single Instruction Multiple Data (SIMD) vector architectures, is significantly hindered by irregular memo...
Byunghyun Jang, Perhaad Mistry, Dana Schaa, Rodrig...
CSO
2009
IEEE
15 years 11 months ago
Association Rules Based Data Mining on Test Data of Physical Health Standard
With the development of modern electronic and computer technologies, sports training and competition became more and more technical. A great deal of data were recorded, including ...
Lan Yu
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 5 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
PERCOM
2009
ACM
15 years 11 months ago
Opening Pervasive Computing to the Masses Using the SEAP Middleware
— The increasing availability of sensing devices has made the possibility of context-aware pervasive computing applications real. However, constructing this software requires ext...
Seth Holloway, Drew Stovall, Jorge Lara-Garduno, C...