Sciweavers

1663 search results - page 47 / 333
» Computer Security in the Real World
Sort
View
CVPR
2012
IEEE
11 years 11 months ago
Globally optimal line clustering and vanishing point estimation in Manhattan world
The projections of world parallel lines in an image intersect at a single point called the vanishing point (VP). VPs are a key ingredient for various vision tasks including rotati...
Jean Charles Bazin, Yongduek Seo, Cédric De...
CHI
2003
ACM
14 years 9 months ago
Unpacking "privacy" for a networked world
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settin...
Leysia Palen, Paul Dourish
ACMDIS
2000
ACM
14 years 1 months ago
Mapping the Physical World to Psychological Reality: Creating Synthetic Environments
The successful creation of telepresence and virtual environments requires a change in design paradigm. We must move away from attempts to recreate reality in its entirety toward t...
Ronald W. Noel, Claudia M. Hunter
CIKM
2006
Springer
14 years 16 days ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
SEUS
2008
IEEE
14 years 3 months ago
Data Services in Distributed Real-Time Embedded Systems
The computing systems are becoming deeply embedded into ordinary life and interact with physical processes and events. They monitor the physical world with sensors and provide app...
Woochul Kang, Sang Hyuk Son