Sciweavers

4744 search results - page 175 / 949
» Connected Computing
Sort
View
CCGRID
2010
IEEE
15 years 4 months ago
An MPI-Stream Hybrid Programming Model for Computational Clusters
The MPI programming model hides network type and topology from developers, but also allows them to seamlessly distribute a computational job across multiple cores in both an intra ...
Emilio Pasquale Mancini, Gregory Marsh, Dhabaleswa...
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 3 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
PRESENCE
2008
110views more  PRESENCE 2008»
15 years 3 months ago
Modeling of Tool-Tissue Interactions for Computer-Based Surgical Simulation: A Literature Review
Surgical simulators present a safe and potentially effective method for surgical training, and can also be used in robot-assisted surgery for pre- and intra-operative planning. Ac...
Sarthak Misra, K. T. Ramesh, Allison M. Okamura
RTAS
2000
IEEE
15 years 7 months ago
Policing Offloaded
Policing of incoming packets can produce very high load in worst-case situations on a receiving computer. In realtime systems, resources must be allocated for such worstcase situa...
Uwe Dannowski, Hermann Härtig
COMBINATORICS
2004
106views more  COMBINATORICS 2004»
15 years 3 months ago
Random Matrices, Magic Squares and Matching Polynomials
Characteristic polynomials of random unitary matrices have been intensively studied in recent years: by number theorists in connection with Riemann zetafunction, and by theoretica...
Persi Diaconis, Alexander Gamburd