Sciweavers

1585 search results - page 126 / 317
» Automatically optimizing secure computation
Sort
View
MOBILITY
2009
ACM
14 years 2 months ago
Detection of images with adult content for parental control on mobile devices?
In this paper we present a prototype for parental control that detects images with adult content received on a mobile device. More specifically, the application that we developed...
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, ...
ACSAC
2002
IEEE
14 years 1 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
AGENTS
2000
Springer
14 years 13 days ago
BoB: an interactive improvisational music companion
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...
Belinda Thom
IPPS
2007
IEEE
14 years 2 months ago
Formal Analysis for Debugging and Performance Optimization of MPI
High-end computing is universally recognized to be a strategic tool for leadership in science and technology. A significant portion of high-end computing is conducted on clusters...
Ganesh Gopalakrishnan, Robert M. Kirby
ICCV
2005
IEEE
14 years 10 months ago
Detection of Concentric Circles for Camera Calibration
The geometry of plane-based calibration methods is well understood, but some user interaction is often needed in practice for feature detection. This paper presents a fully automa...
Guang Jiang, Long Quan