Sciweavers

24188 search results - page 4809 / 4838
» Computing on Encrypted Data
Sort
View
CSCW
2002
ACM
14 years 9 months ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...
JODL
2000
65views more  JODL 2000»
14 years 9 months ago
Nature: a prototype digital archive
In response to the proposal to digitise the journal Nature (1869->1992), published by Macmillan, a pilot project was commissioned to discover the technical issues and ascertain...
Ross MacIntyre, Simon Tanner
JPDC
2000
141views more  JPDC 2000»
14 years 9 months ago
A System for Evaluating Performance and Cost of SIMD Array Designs
: SIMD arrays are likely to become increasingly important as coprocessors in domain specific systems as architects continue to leverage RAM technology in their design. The problem ...
Martin C. Herbordt, Jade Cravy, Renoy Sam, Owais K...
JSA
2000
175views more  JSA 2000»
14 years 9 months ago
Complete worst-case execution time analysis of straight-line hard real-time programs
In this article, the problem of finding a tight estimate on the worst-case execution time (WCET) of a real-time program is addressed. The analysis is focused on straight-line code...
Friedhelm Stappert, Peter Altenbernd
MOC
2000
105views more  MOC 2000»
14 years 9 months ago
On the iteratively regularized Gauss-Newton method for solving nonlinear ill-posed problems
The iteratively regularized Gauss-Newton method is applied to compute the stable solutions to nonlinear ill-posed problems F (x) = y when the data y is given approximately by y wit...
Jin Qi-nian
« Prev « First page 4809 / 4838 Last » Next »