Sciweavers

25316 search results - page 4921 / 5064
» Computational sensor networks
Sort
View
OZCHI
2009
ACM
15 years 10 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
136
Voted
SAC
2009
ACM
15 years 10 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
102
Voted
CSE
2009
IEEE
15 years 10 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
HAPTICS
2009
IEEE
15 years 10 months ago
Remote dynamic proxies for wave-based peer-to-peer haptic interaction
This paper introduces a distributed haptic control architecture that can render direct interaction between users in addition to cooperative manipulation of virtual objects. The pr...
Zhi Li, Daniela Constantinescu
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
15 years 10 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
« Prev « First page 4921 / 5064 Last » Next »