Sciweavers

10790 search results - page 2152 / 2158
» Using feature models to automate model transformations
Sort
View
69
Voted
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 3 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
78
Voted
IROS
2006
IEEE
180views Robotics» more  IROS 2006»
15 years 3 months ago
Real-Time Robot Audition System That Recognizes Simultaneous Speech in The Real World
— This paper presents a robot audition system that recognizes simultaneous speech in the real world by using robotembedded microphones. We have previously reported Missing Featur...
Shun'ichi Yamamoto, Kazuhiro Nakadai, Mikio Nakano...
ASPLOS
2006
ACM
15 years 3 months ago
A spatial path scheduling algorithm for EDGE architectures
Growing on-chip wire delays are motivating architectural features that expose on-chip communication to the compiler. EDGE architectures are one example of communication-exposed mi...
Katherine E. Coons, Xia Chen, Doug Burger, Kathryn...
ELPUB
2006
ACM
15 years 3 months ago
What are the Prospects for Publishing Online Scholarly Journals in Malaysia? The Cultural Constraint
Most of the studies conducted on future business models for electronic scholarly publishing have concentrated on the major publishing areas of North America and Western Europe, an...
Jamay'ah Zakaria, Fytton Rowland
W4A
2006
ACM
15 years 3 months ago
Evaluating interfaces for intelligent mobile search
Recent developments in the mobile phone market have led to a significant increase in the number of users accessing the Mobile Internet. Handsets have been improved to support a d...
Karen Church, Barry Smyth, Mark T. Keane
« Prev « First page 2152 / 2158 Last » Next »