Sciweavers

3547 search results - page 190 / 710
» Computers Seeing People
Sort
View
NDSS
2005
IEEE
15 years 10 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
CHI
1997
ACM
15 years 8 months ago
How to Personalize the Web
Agents can personalize otherwise impersonal computational systems. The World Wide Web presents the same appearance to every user regardless of that user’s past activity. Web Bro...
Rob Barrett, Paul P. Maglio, Daniel C. Kellem
BCS
2008
15 years 5 months ago
Automation of the Complete Sample Management in a Biotech Laboratory
Both Robots and Personal Computers established new markets about 30 years ago and were enabling factors in Automation and Information Technology. However, while you can see Person...
Martin Wojtczyk, Michael Marszalek, Alois Knoll, R...
COMPUTING
2007
81views more  COMPUTING 2007»
15 years 4 months ago
Hybrid curve fitting
We consider a parameterized family of closed planar curves and introduce an evolution process for identifying a member of the family that approximates a given unorganized point cl...
Martin Aigner, Bert Jüttler
IADIS
2004
15 years 5 months ago
Physiology of mobile database: an unconventional database
As the mobility of people increases, anytime, anywhere computing has become a must. The appearance of powerful portable computers, along with advancement in wireless communication...
Imran Khan, Nasir Touheed