Sciweavers

17582 search results - page 3282 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
133
Voted
CHI
2009
ACM
16 years 4 months ago
Remote impact: shadowboxing over a distance
Florian `Floyd' Mueller Distance Lab Horizon Scotland The Enterprise Park Forres, Moray IV36 2AB UK floyd@exertioninterfaces.com Stefan Agamanolis Distance Lab Horizon Scotlan...
Florian Mueller, Stefan Agamanolis, Martin R. Gibb...
150
Voted
MOBISYS
2009
ACM
16 years 4 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
122
Voted
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
16 years 4 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
164
Voted
EUROSYS
2010
ACM
16 years 24 days ago
Q-Clouds: Managing Performance Interference Effects for QoS-Aware Clouds
Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or...
Ripal Nathuji, Aman Kansal, Alireza Ghaffarkhah
148
Voted
SAC
2010
ACM
15 years 10 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
« Prev « First page 3282 / 3517 Last » Next »