Sciweavers

7197 search results - page 187 / 1440
» On the computational power of BlenX
Sort
View
83
Voted
EAGC
2004
Springer
15 years 3 months ago
Dependable Global Computing with JaWS++
In this paper we propose a computational grid platform called JaWS++ that seeks to harvest the power of idle pools of workstations connected through the Internet and integrate them...
George Kakarontzas, Spyros Lalis
95
Voted
WMTE
2006
IEEE
15 years 4 months ago
Invisibility Considered Harmful: Revisiting Traditional Principles of Ubiquitous Computing in the Context of Education
Ubiquitous computing, as a subfield of computer science, has traditionally been associated with a set of principles expressed (loosely but tellingly) with terms like transparency,...
Michael Eisenberg, Ann Eisenberg, Leah Buechley, N...
89
Voted
ESCIENCE
2005
IEEE
15 years 3 months ago
High-Performance Task Distribution for Volunteer Computing
Volunteer computing projects use a task server to manage work. Clients periodically communicate with the server to report completed tasks and get new tasks. The rate at which the ...
David P. Anderson, Eric Korpela, Rom Walton
72
Voted
CHI
2001
ACM
15 years 10 months ago
Folk computing: revisiting oral tradition as a scaffold for co-present communities
In this paper, we introduce Folk Computing: an approach for using technology to support co-present community building inspired by the concept of folklore. We also introduce a new ...
Richard Borovoy, Brian Silverman, Tim Gorton, Matt...
73
Voted
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
15 years 10 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...