Sciweavers

4164 search results - page 709 / 833
» Application and desktop sharing
Sort
View
VR
2010
IEEE
154views Virtual Reality» more  VR 2010»
13 years 8 months ago
On error bound estimation for motion prediction
A collaborative virtual environment (CVE) allows remote users to access and modify shared data through networks, such as the Internet. However, when the users are connected via th...
Rynson W. H. Lau, Kenneth Lee
WIAS
2010
102views more  WIAS 2010»
13 years 8 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
DSD
2010
IEEE
137views Hardware» more  DSD 2010»
13 years 8 months ago
A C-to-RTL Flow as an Energy Efficient Alternative to Embedded Processors in Digital Systems
We present a high-level synthesis flow for mapping an algorithm description (in C) to a provably equivalent registertransfer level (RTL) description of hardware. This flow uses an ...
Sameer D. Sahasrabuddhe, Sreenivas Subramanian, Ku...
ECAI
2010
Springer
13 years 8 months ago
Social Recommendation with Interpersonal Influence
Social recommendation, that an individual recommends an item to another, has gained popularity and success in web applications such as online sharing and shopping services. It is l...
Junming Huang, Xueqi Cheng, Jiafeng Guo, Huawei Sh...
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
13 years 8 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...