Sciweavers

4744 search results - page 110 / 949
» Connected Computing
Sort
View
EUROCRYPT
2008
Springer
15 years 4 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
TEI
2010
ACM
135views Hardware» more  TEI 2010»
15 years 10 months ago
Hands and fingers: a mobile platform for a person-centric network of computational objects
We describe a practical vision of ubiquitous computing with tangible interfaces, that orbits around an individual and is mediated by his or her personal consumer electronic device...
John Kestner, Henry Holtzman
AINA
2010
IEEE
14 years 11 months ago
Neural Network Trainer through Computer Networks
- This paper introduces a neural network training tool through computer networks. The following algorithms, such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Lev...
Nam Pham, Hao Yu, Bogdan M. Wilamowski
CHI
2011
ACM
14 years 6 months ago
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...
GIS
2003
ACM
16 years 4 months ago
Constructing a dem from grid-based data by computing intermediate contours
We present a technique for creating a digital elevation model (DEM) from grid-based contour data. The method computes new, intermediate contours in between existing isolines. Thes...
Michael B. Gousie, Wm. Randolph Franklin