Sciweavers

24188 search results - page 448 / 4838
» Computing on Encrypted Data
Sort
View
146
Voted
DEXAW
2004
IEEE
95views Database» more  DEXAW 2004»
15 years 8 months ago
Simulation Model for Self-Adaptive Applications in Pervasive Computing
In Autonomic Computing, an application needs to be aware of its environment. While the term "environment" is not normally understood as being a physical environment, in ...
Markus C. Huebscher, Julie A. McCann
DAGM
2006
Springer
15 years 8 months ago
Linear vs. Nonlinear Feature Combination for Saliency Computation: A Comparison with Human Vision
In the heart of the computer model of visual attention, an interest or saliency map is derived from an input image in a process that encompasses several data combination steps. Whi...
Nabil Ouerhani, Alexandre Bur, Heinz Hügli
PPOPP
1995
ACM
15 years 8 months ago
Optimistic Active Messages: A Mechanism for Scheduling Communication with Computation
Low-overhead message passing is critical to the performance of many applications. Active Messages[27] reduce the software overhead for message handling: messages are run as handle...
Deborah A. Wallach, Wilson C. Hsieh, Kirk L. Johns...
ASSETS
2008
ACM
15 years 7 months ago
Understanding pointing problems in real world computing environments
Understanding how pointing performance varies in real world computer use and over time can provide valuable insight about how systems should accommodate changes in pointing behavi...
Amy Hurst, Jennifer Mankoff, Scott E. Hudson
131
Voted
CSREASAM
2006
15 years 6 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...