Sciweavers

20175 search results - page 40 / 4035
» Is abstraction the key to computing
Sort
View
136
Voted
CSREAPSC
2006
15 years 1 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
ISCAS
2005
IEEE
127views Hardware» more  ISCAS 2005»
15 years 6 months ago
Convergent micro-pipelines: a versatile operator for mixed asynchronous-synchronous computations
Abstract— Micro-pipelines are linear (1-D) structures for asynchronous communications. In retinotopic VLSI vision chips, communicating over 2-D image regions is a key to efficie...
Valentin Gies, Thierry M. Bernard, Alain Mé...
119
Voted
CCS
2011
ACM
14 years 14 days ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
77
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 18 days ago
Abstract Fixpoint Computations with Numerical Acceleration Methods
Fixpoint Computations with Numerical Acceleration Methods Olivier Bouissou1 , Yassamine Seladji1 CEA, LIST, Laboratory for the Modeling and Analysis of Interacting Systems 91191 Gi...
Olivier Bouissou, Yassamine Seladji, Alexandre Cha...
71
Voted
EDUTAINMENT
2006
Springer
15 years 4 months ago
Computer Supported Remote Learning and Gaming Using Tele-Face Mouse System
Abstract. This paper presents a new computer supported remote learning and gaming method using Tele-Face Mouse system. The Tele-Face Mouse system is being developed as a teleconfer...
Sang Chul Ahn, Jin Hak Kim, Hyoung-Gon Kim