Sciweavers

1990 search results - page 384 / 398
» Conceptual User Tracking
Sort
View
CHI
2002
ACM
14 years 10 months ago
Interacting at a distance: measuring the performance of laser pointers and other devices
It is difficult to interact with computer displays that are across the room. A popular approach is to use laser pointers tracked by a camera, but interaction techniques using lase...
Brad A. Myers, Rishi Bhatnagar, Jeffrey Nichols, C...
PODS
2001
ACM
148views Database» more  PODS 2001»
14 years 9 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
ICFP
2008
ACM
14 years 9 months ago
Compiling self-adjusting programs with continuations
Self-adjusting programs respond automatically and efficiently to input changes by tracking the dynamic data dependences of the computation and incrementally updating the output as...
Ruy Ley-Wild, Matthew Fluet, Umut A. Acar
MOBISYS
2008
ACM
14 years 9 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
EUROSYS
2009
ACM
14 years 6 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...