Sciweavers

3608 search results - page 158 / 722
» computer 2011
Sort
View
267
Voted
ICDCS
2011
IEEE
14 years 3 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
139
Voted
ASPLOS
2011
ACM
14 years 7 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
130
Voted
COGSCI
2011
108views more  COGSCI 2011»
14 years 10 months ago
The AHA! Experience: Creativity Through Emergent Binding in Neural Networks
Many kinds of creativity result from combination of mental representations. This paper provides a computational account of how creative thinking can arise from combining neural pa...
Paul Thagard, Terrence C. Stewart
JSC
2011
71views more  JSC 2011»
14 years 10 months ago
Chern numbers of smooth varieties via homotopy continuation and intersection theory
Homotopy continuation provides a numerical tool for computing the equivalence of a smooth variety in an intersection product. Intersection theory provides a theoretical tool for re...
Sandra Di Rocco, David Eklund, Chris Peterson, And...
129
Voted
ATAL
2011
Springer
14 years 3 months ago
A computational model of achievement motivation for artificial agents
Computational models of motivation are tools that artificial agents can use to autonomously identify, prioritize, and select the goals they will pursue. Previous research has focu...
Kathryn Elizabeth Merrick