Sciweavers

24188 search results - page 4758 / 4838
» Computing on Encrypted Data
Sort
View
LICS
1991
IEEE
15 years 6 months ago
Logic Programming in a Fragment of Intuitionistic Linear Logic
When logic programming is based on the proof theory of intuitionistic logic, it is natural to allow implications in goals and in the bodies of clauses. Attempting to prove a goal ...
Joshua S. Hodas, Dale Miller
ASIAMS
2008
IEEE
15 years 5 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
ASPLOS
2008
ACM
15 years 5 months ago
General and efficient locking without blocking
Standard concurrency control mechanisms offer a trade-off: Transactional memory approaches maximize concurrency, but suffer high overheads and cost for retrying in the case of act...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
ASSETS
2008
ACM
15 years 5 months ago
Software and technologies designed for people with autism: what do users want?
Software developers, designers and researchers have been looking to technology for solutions to help and educate people with autism for over two decades. There are many examples o...
Cynthia Putnam, Lorna Chong
ATAL
2008
Springer
15 years 5 months ago
A model of gaze for the purpose of emotional expression in virtual embodied agents
Currently, state of the art virtual agents lack the ability to display emotion as seen in actual humans, or even in hand-animated characters. One reason for the emotional inexpres...
Brent J. Lance, Stacy Marsella
« Prev « First page 4758 / 4838 Last » Next »