Sciweavers

1826 search results - page 288 / 366
» Controlling data movement in global computing applications
Sort
View
CCS
2006
ACM
15 years 7 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
NDSS
2008
IEEE
15 years 10 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
CHI
2008
ACM
16 years 4 months ago
MAHI: investigation of social scaffolding for reflective thinking in diabetes management
In the recent years, the number of individuals engaged in self-care of chronic diseases has grown exponentially. Advances in computing technologies help individuals with chronic d...
Lena Mamykina, Elizabeth D. Mynatt, Patricia David...
GECCO
2010
Springer
194views Optimization» more  GECCO 2010»
15 years 8 months ago
Fitting multi-planet transit models to photometric time-data series by evolution strategies
In this paper we present the application of an evolution strategy to the problem of detecting multi-planet transit events in photometric time-data series. Planetary transits occur...
Andreas M. Chwatal, Günther R. Raidl, Michael...
SIGGRAPH
1996
ACM
15 years 8 months ago
Efficient Generation of Motion Transitions Using Spacetime Constraints
This paper describesthe application of spacetime constraints to creating transitions between segments of human body motion. The motion transition generation uses a combination of ...
Charles Rose, Brian K. Guenter, Bobby Bodenheimer,...