Results 1  10
of
266,922
The alignment of order and space in arithmetic computation
 in Proceedings of the TwentyEighth Annual Conference of the Cognitive Science Society, Lawrence Erlbaum Associates
, 2007
"... Two experiments explore the role that spatial format has on arithmetic computations. In printed arithmetic expressions containing both multiplications and additions, terms that are multiplied are often placed closer together than terms that are added. These experiments test whether that external ten ..."
Abstract

Cited by 7 (0 self)
 Add to MetaCart
Two experiments explore the role that spatial format has on arithmetic computations. In printed arithmetic expressions containing both multiplications and additions, terms that are multiplied are often placed closer together than terms that are added. These experiments test whether that external
Secure arithmetic computation with no honest majority
 In Theory of Cryptography Conference — TCC ’09
, 2009
"... We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case of twoparty protocols with security against malicious parties, our main goals are to: (1) only make blackbox calls to th ..."
Abstract

Cited by 14 (1 self)
 Add to MetaCart
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case of twoparty protocols with security against malicious parties, our main goals are to: (1) only make blackbox calls
Simulating Physics with Computers
 SIAM Journal on Computing
, 1982
"... A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time of at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. ..."
Abstract

Cited by 601 (1 self)
 Add to MetaCart
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time of at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration
Cerebellar Model Arithmetic Computer CMAC
, 1994
"... In this section we review the basic operating principles of the CMAC neural network as proposed by Albus [2,47]. We then present a mathematical description of the conventional CMAC in a form intended to facilitate software implementation. The notation used is somewhat different than in the original ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
In this section we review the basic operating principles of the CMAC neural network as proposed by Albus [2,47]. We then present a mathematical description of the conventional CMAC in a form intended to facilitate software implementation. The notation used is somewhat different than in the original Albus papers, but the set of equations presented is numerically equivalent to the original Albus algorithm. General Operation of the Albus CMAC The operation of the Albus CMAC [2,47,11] can most easily be described in terms of a large set of overlapping, multidimensional receptive fields with finite boundaries. Any input vector falls within the range of some of the local receptive fields (the excited receptive fields), and falls outside of the range of most of the receptive fields. The response of the CMAC neural network to a given input is the average of the responses of the receptive fields excited by that input, and is not affected by the other receptive fields. Similarly, neural network training for a given input vector affects the adjustable parameters of the excited receptive fields, but does not affect the parameters of the remaining majority of receptive fields. The organization of the receptive fields of a typical Albus CMAC neural network with a twodimensional
Arithmetic · Computational Model · Startle Response
"... Adding a physiological representation to cognitive architectures offers an attractive approach to modeling the effects of stress on cognition. We introduce ACTRΦ, an extended version of the ACTR cognitive architecture that includes an integrative physiological model. The extension allows the rep ..."
Abstract
 Add to MetaCart
the representation of nonlinear physiological effects on cognition, and cognitive effects on physiology. This additional physiological substrate was used to represent potential effects of a startle response during a mental arithmetic (subtraction) task. We compare predictions from models loaded into the new
Distributed Computing in Practice: The Condor Experience
 Concurrency and Computation: Practice and Experience
, 2005
"... Since 1984, the Condor project has enabled ordinary users to do extraordinary computing. Today, the project continues to explore the social and technical problems of cooperative computing on scales ranging from the desktop to the worldwide computational grid. In this chapter, we provide the history ..."
Abstract

Cited by 542 (7 self)
 Add to MetaCart
Since 1984, the Condor project has enabled ordinary users to do extraordinary computing. Today, the project continues to explore the social and technical problems of cooperative computing on scales ranging from the desktop to the worldwide computational grid. In this chapter, we provide
A survey of generalpurpose computation on graphics hardware
, 2007
"... The rapid increase in the performance of graphics hardware, coupled with recent improvements in its programmability, have made graphics hardware acompelling platform for computationally demanding tasks in awide variety of application domains. In this report, we describe, summarize, and analyze the l ..."
Abstract

Cited by 545 (18 self)
 Add to MetaCart
The rapid increase in the performance of graphics hardware, coupled with recent improvements in its programmability, have made graphics hardware acompelling platform for computationally demanding tasks in awide variety of application domains. In this report, we describe, summarize, and analyze
Basic concepts and taxonomy of dependable and secure computing
 IEEE TDSC
, 2004
"... This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic defin ..."
Abstract

Cited by 758 (6 self)
 Add to MetaCart
This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are given first. They are then commented upon, and supplemented by additional definitions, which address the threats to dependability and security (faults, errors, failures), their attributes, and the means for their achievement (fault prevention, fault tolerance, fault removal, fault forecasting). The aim is to explicate a set of general concepts, of relevance across a wide range of situations and, therefore, helping communication and cooperation among a number of scientific and technical communities, including ones that are concentrating on particular types of system, of system failures, or of causes of system failures.
Publickey cryptosystems based on composite degree residuosity classes
 IN ADVANCES IN CRYPTOLOGY — EUROCRYPT 1999
, 1999
"... This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to publickey cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes: a trapdoor permutation and two homomorphic probabilist ..."
Abstract

Cited by 991 (4 self)
 Add to MetaCart
probabilistic encryption schemes computationally comparable to RSA. Our cryptosystems, based on usual modular arithmetics, are provably secure under appropriate assumptions in the standard model.
Results 1  10
of
266,922