Sciweavers

6982 search results - page 1384 / 1397
» Collaboration
Sort
View
111
Voted
SECRYPT
2010
129views Business» more  SECRYPT 2010»
15 years 13 days ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
144
Voted
SRDS
2010
IEEE
15 years 13 days ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
UIST
2010
ACM
15 years 13 days ago
VizWiz: nearly real-time answers to visual questions
Visual information pervades our environment. Vision is used to de cide everything from what we want to eat at a restaurant and which bus route to take to whether our clothes match...
Jeffrey P. Bigham, Chandrika Jayant, Hanjie Ji, Gr...
130
Voted
VRST
2010
ACM
15 years 13 days ago
Automatic registration of multiple projectors on swept surfaces
In this paper, we present the first method to geometrically register multiple projectors on a swept surface (e.g. a truncated dome) using a single uncalibrated camera without usin...
Behzad Sajadi, Aditi Majumder
127
Voted
ANCS
2009
ACM
15 years 12 days ago
Design and performance analysis of a DRAM-based statistics counter array architecture
The problem of maintaining efficiently a large number (say millions) of statistics counters that need to be updated at very high speeds (e.g. 40 Gb/s) has received considerable re...
Haiquan (Chuck) Zhao, Hao Wang, Bill Lin, Jun (Jim...
« Prev « First page 1384 / 1397 Last » Next »