Sciweavers

1663 search results - page 281 / 333
» Computer Security in the Real World
Sort
View
VRST
2010
ACM
15 years 1 months ago
Augmentation techniques for efficient exploration in head-mounted display environments
Physical characteristics and constraints of today's head-mounted displays (HMDs) often impair interaction in immersive virtual environments (VEs). For instance, due to the li...
Benjamin Bolte, Gerd Bruder, Frank Steinicke, Klau...
MOBISYS
2008
ACM
16 years 3 months ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
MM
2004
ACM
158views Multimedia» more  MM 2004»
15 years 9 months ago
"Sousveillance": inverse surveillance in multimedia imaging
This is a personal narrative that began 30 years ago as a childhood hobby, of wearing and implanting various sensors, effectors, and multimedia computation in order to re-define...
Steve Mann
COGCOM
2010
107views more  COGCOM 2010»
15 years 1 months ago
Where to Look Next? Combining Static and Dynamic Proto-objects in a TVA-based Model of Visual Attention
To decide ``Where to look next ?'' is a central function of the attention system of humans, animals and robots. Control of attention depends on three factors, that is, lo...
Marco Wischnewski, Anna Belardinelli, Werner X. Sc...
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 3 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...