Sciweavers

3108 search results - page 71 / 622
» The Elements of Computer Credibility
Sort
View
ITNG
2010
IEEE
15 years 2 months ago
Conceptual Elaboration of a Geographic Intelligence Based on Service Oriented Architecture (SOA)
This paper, the first in a series of four, presents the conceptual design of a subsystem with integrative function based on a Service-Oriented Architecture (SOA), named Geographic...
Fernando Maciel Lima e Sousa, Valdevino Siqueira C...
CVPR
2012
IEEE
13 years 7 days ago
The scale of edges
Although the scale of isotropic visual elements such as blobs and interest points, e.g. SIFT[12], has been well studied and adopted in various applications, how to determine the s...
Xianming Liu, Changhu Wang, Hongxun Yao, Lei Zhang
BSL
2005
74views more  BSL 2005»
14 years 9 months ago
Turing computations on ordinals
We define the notion of ordinal computability by generalizing standard Turing computability on tapes of length to computations on tapes of arbitrary ordinal length. We show that a ...
Peter Koepke
DAC
1996
ACM
15 years 1 months ago
Delay Minimal Decomposition of Multiplexers in Technology Mapping
Technology mapping requires the unmapped logic network to be represented in terms of base functions, usually two-input NORs and inverters. Technology decomposition is the step tha...
Shashidhar Thakur, D. F. Wong, Shankar Krishnamoor...
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...