Primitives

Results: 220



#Item
171Compare-and-swap / Linearizability / Test-and-set / Fetch-and-add / Non-blocking algorithm / CPU cache / Spinlock / Parallel computing / Instruction set / Concurrency control / Computing / Computer architecture

Tech. Rep[removed]Scalability of Atomic Primitives on Distributed Shared Memory Multiprocessors Maged M. Michael

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2011-03-27 21:03:43
172NesC / Electronics / TinyOS / Sensor node / Embedded system / Crossbow Technology / Mote / Personal digital assistant / Wireless sensor network / Technology / Computing

Programming Primitives for Wireless Sensor Networks Matt Welsh Harvard University Division of Engineering and Applied Sciences

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2003-10-02 19:16:37
173Mind / Computational neuroscience / Neural networks / Reinforcement learning / Expectation–maximization algorithm / Artificial neural network / Fisher information / Motor learning / Statistics / Machine learning / Estimation theory

Policy Search for Motor Primitives in Robotics Jens Kober, Jan Peters Max Planck Institute for Biological Cybernetics Spemannstr[removed]Tübingen, Germany

Add to Reading List

Source URL: www-clmc.usc.edu

Language: English - Date: 2009-01-13 06:30:39
174Science / Identity management / Social issues / Knowledge / Game theory / Privacy / Internet privacy / Cryptography / Nash equilibrium / Formal sciences / Decision theory / Ethics

Introduction Basics of game theory Co-utility Co-utility example applications Cryptographic primitives for gradual privacy/utility Conclusions and research directions

Add to Reading List

Source URL: blogs.iec.cat

Language: English - Date: 2013-02-26 05:16:32
175Data / Search algorithms / Metadata / Distributed computing architecture / MapReduce / Parallel computing / Hash function / Hash table / Dimension / Data warehousing / Data management / Computing

Execution Primitives for Scalable Joins and Aggregations in Map Reduce Srinivas Vemuri, Maneesh Varshney, Krishna Puttaswamy, Rui Liu LinkedIn Mountain View, CA

Add to Reading List

Source URL: linkedin.github.io

Language: English - Date: 2014-11-12 21:57:32
176Microprocessors / Electronic design / Reconfigurable computing / Field-programmable gate array / Computer engineering / Multi-core processor / Soft microprocessor / Xilinx / Semiconductor intellectual property core / Electronic engineering / Electronics / Digital electronics

Security Primitives for Reconfigurable Hardware-Based Systems

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-11-15 16:23:20
177Structure / Attractor / Autonomous system / Differential equation / Control theory / Linear dynamical system / Nonlinear system / Lorenz attractor / Chaos theory / Dynamical systems / Mathematical analysis / Mathematics

LETTER Communicated by Hirokazu Tanaka Dynamical Movement Primitives: Learning Attractor Models for Motor Behaviors

Add to Reading List

Source URL: www-clmc.usc.edu

Language: English - Date: 2012-12-07 21:48:24
178Physical quantities / Introductory physics / Rotation / Angular momentum / Robotics / Spin / Humanoid robot / Zero moment point / Momentum / Physics / Rotational symmetry / Conservation laws

2008 8th IEEE-RAS International Conference on Humanoid Robots December[removed], 2008/ Daejeon, Korea TP1-7 Angular Momentum Primitives for Human Turning:

Add to Reading List

Source URL: biomech.media.mit.edu

Language: English - Date: 2013-07-10 22:06:22
179Rotation / Conservation laws / Introductory physics / Humanoid robot / Angular momentum / Robotics / Gait analysis / Spin / Kinematics / Physics / Physical quantities / Rotational symmetry

Proceedings[removed]IEEEIFISJ International Conferenceon Intelligent Robots and %stems September 28 -October 2,2004, Sendal. Japan Angular Momentum Primitives for Human Walking: Biomechanics and Control

Add to Reading List

Source URL: biomech.media.mit.edu

Language: English - Date: 2013-07-10 18:50:27
180NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
UPDATE