Sciweavers

13436 search results - page 2546 / 2688
» e
Sort
View
156
Voted
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
CIDR
2009
119views Algorithms» more  CIDR 2009»
15 years 5 months ago
DBMSs Should Talk Back Too
Natural language user interfaces to database systems have been studied for several decades now. They have mainly focused on parsing and interpreting natural language queries to ge...
Alkis Simitsis, Yannis E. Ioannidis
ECAI
2010
Springer
15 years 5 months ago
Learning When to Use Lazy Learning in Constraint Solving
Abstract. Learning in the context of constraint solving is a technique by which previously unknown constraints are uncovered during search and used to speed up subsequent search. R...
Ian P. Gent, Christopher Jefferson, Lars Kotthoff,...
EUROPAR
2010
Springer
15 years 5 months ago
Optimized Dense Matrix Multiplication on a Many-Core Architecture
Abstract. Traditional parallel programming methodologies for improving performance assume cache-based parallel systems. However, new architectures, like the IBM Cyclops-64 (C64), b...
Elkin Garcia, Ioannis E. Venetis, Rishi Khan, Guan...
HPDC
2010
IEEE
15 years 5 months ago
Comparison of resource platform selection approaches for scientific workflows
Cloud computing is increasingly considered as an additional computational resource platform for scientific workflows. The cloud offers opportunity to scale-out applications from d...
Yogesh L. Simmhan, Lavanya Ramakrishnan
« Prev « First page 2546 / 2688 Last » Next »