Sciweavers

1663 search results - page 216 / 333
» Computer Security in the Real World
Sort
View
USS
2010
15 years 2 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
CASC
2006
Springer
128views Mathematics» more  CASC 2006»
15 years 7 months ago
New Domains for Applied Quantifier Elimination
We address various aspects of our computer algebra-based computer logic system redlog. There are numerous examples in the literature for successful applications of redlog to practi...
Thomas Sturm
EMMCVPR
2007
Springer
15 years 10 months ago
Compositional Object Recognition, Segmentation, and Tracking in Video
Abstract. The complexity of visual representations is substantially limited by the compositional nature of our visual world which, therefore, renders learning structured object mod...
Björn Ommer, Joachim M. Buhmann
APGV
2010
ACM
328views Visualization» more  APGV 2010»
15 years 6 months ago
Can I pass?: using affordances to measure perceived size in virtual environments
Perception of an accurate sense of the scale depicted in computer graphics is important for many applications. How to best characterize the accuracy of space perception in compute...
Michael Geuss, Jeanine Stefanucci, Sarah H. Creem-...
WWW
2004
ACM
16 years 4 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl