Sciweavers

18374 search results - page 3570 / 3675
» Applications for data hiding
Sort
View
PODS
2010
ACM
306views Database» more  PODS 2010»
14 years 3 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
TAMC
2010
Springer
14 years 3 months ago
Streaming Algorithms for Some Problems in Log-Space
Abstract. In this paper, we give streaming algorithms for some problems which are known to be in deterministic log-space, when the number of passes made on the input is unbounded. ...
Ajesh Babu, Nutan Limaye, Girish Varma
HAPTICS
2002
IEEE
14 years 3 months ago
Autostereoscopic and Haptic Visualization for Space Exploration and Mission Design
We have developed a multi-modal virtual environment set-up by fusing visual and haptic images through the use of a new autostereoscopic display and a force-feedback haptic device....
Cagatay Basdogan, Mitchell J. H. Lum, Jose Salcedo...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
14 years 3 months ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...
ICARCV
2002
IEEE
166views Robotics» more  ICARCV 2002»
14 years 3 months ago
Similarity measure determination from NURBS-warping method
With the advances in digital imagery, large accessible data storage, internet repositories, and image applications, information conveyed through images is gaining in importance. T...
Kim Meng Liang, Mandava Rajeswari, Bee Ee Khoo
« Prev « First page 3570 / 3675 Last » Next »