Sciweavers

5684 search results - page 283 / 1137
» Computing with active dendrites
Sort
View
SIGCSE
2008
ACM
119views Education» more  SIGCSE 2008»
15 years 4 months ago
Exploring studio-based instructional models for computing education
While the demand for college graduates with computing skills continues to rise, such skills no longer equate to mere programming skills. Modern day computing jobs demand design, c...
Christopher D. Hundhausen, N. Hari Narayanan, Mart...
ISCA
2007
IEEE
171views Hardware» more  ISCA 2007»
15 years 11 months ago
Power provisioning for a warehouse-sized computer
Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilit...
Xiaobo Fan, Wolf-Dietrich Weber, Luiz André...
IJISEC
2007
119views more  IJISEC 2007»
15 years 4 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 5 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
ASIACRYPT
2008
Springer
15 years 6 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas