Sciweavers

13717 search results - page 2358 / 2744
» Control Systems
Sort
View
CCS
2011
ACM
14 years 4 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum

Publication
342views
16 years 6 months ago
Understanding the relationships between regional accessibility travel behaviour and home value
Accessibility is a comprehensive measure of the interaction between land use and transportation systems. It has been put forward as a performance-measure for evaluating the land u...
Cerda, A. and El-Geneidy, A.
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
16 years 5 months ago
How to Determine a Good Multi-Programming Level for External Scheduling
Scheduling/prioritization of DBMS transactions is important for many applications that rely on database backends. A convenient way to achieve scheduling is to limit the number of ...
Bianca Schroeder, Mor Harchol-Balter, Arun Iyengar...
VIS
2007
IEEE
181views Visualization» more  VIS 2007»
16 years 5 months ago
Shadow-Driven 4D Haptic Visualization
Just as we can work with two-dimensional floor plans to communicate 3D architectural design, we can exploit reduced-dimension shadows to manipulate the higher-dimensional objects ...
Hui Zhang, Andrew J. Hanson
DAC
2009
ACM
16 years 5 months ago
Process variation characterization of chip-level multiprocessors
Within-die variation in leakage power consumption is substantial and increasing for chip-level multiprocessors (CMPs) and multiprocessor systems-on-chip. Dealing with this problem...
Lide Zhang, Lan S. Bai, Robert P. Dick, Li Shang, ...
« Prev « First page 2358 / 2744 Last » Next »