Sciweavers

3108 search results - page 95 / 622
» The Elements of Computer Credibility
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Joint Computation and Communication Scheduling to Enable Rich Mobile Applications
Abstract—Increasing interest in sensor networking and ubiquitous computing has created a trend towards embedding more and more intelligence into our surroundings. This enables th...
Shoubhik Mukhopadhyay, Curt Schurgers, Sujit Dey
ICRA
2005
IEEE
141views Robotics» more  ICRA 2005»
15 years 10 months ago
On Computing Complex Navigation Functions
— This paper addresses the problem of efficiently computing robot navigation functions. Navigation functions are potential functions free of spurious local minima that present a...
Luciano C. A. Pimenta, Alexandre R. Fonseca, Guilh...
ISCAS
2005
IEEE
124views Hardware» more  ISCAS 2005»
15 years 10 months ago
Parallel FFT computation with a CDMA-based network-on-chip
— Fast Fourier transform (FFT) algorithms are used in a wide variety of digital signal processing applications and many of these require high-performance parallel implementations...
Daewook Kim, Manho Kim, Gerald E. Sobelman
CRYPTO
2001
Springer
95views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Robustness for Free in Unconditional Multi-party Computation
We present a very efficient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
Martin Hirt, Ueli M. Maurer
HUC
1999
Springer
15 years 8 months ago
QoS and Context Awareness for Mobile Computing
Systems must provide for mobile applications to be aware of the context in which they are being used. This is necessary to permit adaptation to heterogeneity of hosts and networks...
Dan Chalmers, Morris Sloman