Sciweavers

5684 search results - page 1053 / 1137
» Computing with active dendrites
Sort
View
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
15 years 8 months ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
NEUROSCIENCE
2001
Springer
15 years 8 months ago
Locust Olfaction
During odour recognition, excitatory and inhibitory groups of neurons in the second stage of the locust olfactory system, the antennal lobe (AL), fire alternately. There is little...
David C. Sterratt
WDAG
2001
Springer
131views Algorithms» more  WDAG 2001»
15 years 8 months ago
The Complexity of Synchronous Iterative Do-All with Crashes
Abstract. The ability to cooperate on common tasks in a distributed setting is key to solving a broad range of computation problems ranging from distributed search such as SETI to ...
Chryssis Georgiou, Alexander Russell, Alexander A....
120
Voted
LCN
2000
IEEE
15 years 8 months ago
Reliability Modeling of SCI Ring-Based Topologies
Performance evaluation and reliability prediction are two important factors in the study of multiprocessor and cluster interconnects. One such interconnect is the Scalable Coheren...
M. A. Sarwar, Alan D. George, David E. Collins
ACMDIS
2000
ACM
15 years 8 months ago
The Building Blocks of Experience: An Early Framework for Interaction Designers
Design activity has recently attempted to embrace “designing the user experience.” Designers need to demystify how we design for user experience and how the products we design...
Jodi Forlizzi, Shannon Ford
« Prev « First page 1053 / 1137 Last » Next »