Sciweavers

24188 search results - page 379 / 4838
» Computing on Encrypted Data
Sort
View
LCR
1998
Springer
109views System Software» more  LCR 1998»
15 years 9 months ago
Expressing Irregular Computations in Modern Fortran Dialects
Abstract. Modern dialects of Fortran enjoy wide use and good support on highperformance computers as performance-oriented programming languages. By providing the ability to express...
Jan Prins, Siddhartha Chatterjee, Martin Simons
SEC
2004
15 years 6 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
130
Voted
JMIV
2010
78views more  JMIV 2010»
14 years 11 months ago
Unified Computation of Strict Maximum Likelihood for Geometric Fitting
A new numerical scheme is presented for strictly computing maximum likelihood (ML) of geometric fitting problems. Intensively studied in the past are those methods that first tran...
Kenichi Kanatani, Yasuyuki Sugaya
CHI
2011
ACM
14 years 8 months ago
MusEEGk: a brain computer musical interface
We present a novel integration of a brain-computer interface (BCI) with a music step sequencer composition program. Previous BCIs that utilize EEG data to form music provide users...
Yee Chieh "Denise" Chew, Eric Caspary
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 5 months ago
Sustainable operation and management of data center chillers using temporal data mining
Motivation: Data centers are a critical component of modern IT infrastructure but are also among the worst environmental offenders through their increasing energy usage and the re...
Debprakash Patnaik, Manish Marwah, Ratnesh K. Shar...