Sciweavers

298 search results - page 51 / 60
» Computer security: quality rather than quantity
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
12 years 6 days ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
CHI
2007
ACM
14 years 10 months ago
Software or wetware?: discovering when and why people use digital prosthetic memory
Our lives are full of memorable and important moments, as well as important items of information. The last few years have seen the proliferation of digital devices intended to sup...
Steve Whittaker, Vaiva Kalnikaité
EUROGRAPHICS
2010
Eurographics
14 years 6 months ago
The Virtual Director: a Correlation-Based Online Viewing of Human Motion
Automatic camera control for scenes depicting human motion is an imperative topic in motion capture base animation, computer games, and other animation based fields. This challen...
Jackie Assa, Lior Wolf, Daniel Cohen-Or
CE
2008
156views more  CE 2008»
13 years 10 months ago
Interactive story authoring: A viable form of creative expression for the classroom
The unprecedented growth in numbers of children playing computer games has stimulated discussion and research regarding what, if any, educational value these games have for teachi...
Mike Carbonaro, Maria Cutumisu, Harvey Duff, Steph...
CGF
2007
168views more  CGF 2007»
13 years 9 months ago
Global Illumination using Photon Ray Splatting
We present a novel framework for efficiently computing the indirect illumination in diffuse and moderately glossy scenes using density estimation techniques. Many existing global...
Robert Herzog, Vlastimil Havran, Shin-ichi Kinuwak...