Sciweavers

34181 search results - page 288 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
15 years 8 months ago
Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare
The U.S. military is in the midst of a transformation. While business leaders moved quickly to put computing power in the hands of individuals, the military establishment has been...
Mark Adkins, John Kruse, Robert Younger
GPC
2010
Springer
15 years 8 months ago
Virtual EZ Grid: A Volunteer Computing Infrastructure for Scientific Medical Applications
This paper presents the Virtual EZ Grid project, based on the XtremWeb-CH (XWCH) volunteer computing platform. The goal of the project is to introduce a flexible distributed comput...
Mohamed Ben Belgacem, Nabil Abdennadher, Marko Nii...
FECS
2010
131views Education» more  FECS 2010»
15 years 1 months ago
The Mythical Creature Approach - A Simulation Alternative to Building Computer Architectures
In this paper, we present a method to help teach computer architecture (or computer organization) by developing an in class system where the students, themselves, compile high-leve...
Peter Jamieson, Darrel Davis, Brooke Spangler
CHI
2009
ACM
16 years 3 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
SAC
2009
ACM
15 years 10 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...