Sciweavers

6195 search results - page 31 / 1239
» Cloud Computing Security
Sort
View
SAC
2004
ACM
15 years 8 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann
80
Voted
COMPUTER
2010
101views more  COMPUTER 2010»
15 years 2 months ago
Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?
Karthik Kumar, Yung-Hsiang Lu
140
Voted
IACR
2011
158views more  IACR 2011»
14 years 2 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
112
Voted
3DPVT
2006
IEEE
189views Visualization» more  3DPVT 2006»
15 years 8 months ago
Fast Safe Spline Surrogates for Large Point Clouds
To support real-time computation with large, possibly evolving point clouds and range data, we fit a trimmed uniform tensor-product spline function from one direction. The graph ...
Ashish Myles, Jörg Peters
CHI
2011
ACM
14 years 6 months ago
Tag clouds and keyword clouds: evaluating zero-interaction benefits
Tag clouds are typically presented so that users can actively utilize community-generated metadata to query a collection. This research investigates whether such keyword clouds, a...
Mathew J. Wilson, Max L. Wilson