Sciweavers

2458 search results - page 472 / 492
» Database-Management Principles And Applications
Sort
View
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
14 years 6 days ago
The unavailable candidate model: a decision-theoretic view of social choice
One of the fundamental problems in the theory of social choice is aggregating the rankings of a set of agents (or voters) into a consensus ranking. Rank aggregation has found appl...
Tyler Lu, Craig Boutilier
SIGGRAPH
2010
ACM
13 years 12 months ago
Example-based wrinkle synthesis for clothing animation
This paper describes a method for animating the appearance of clothing, such as pants or a shirt, that fits closely to a figure’s body. Compared to flowing cloth, such as loo...
Huamin Wang, Florian Hecht, Ravi Ramamoorthi, Jame...
ACSAC
2000
IEEE
13 years 11 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
ICMCS
2000
IEEE
84views Multimedia» more  ICMCS 2000»
13 years 11 months ago
Multi-modal Interaction in the Age of Information Appliances
The coming millenium will be characterized by the availability of multiple information appliances that make ubiquitous information access an accepted fact of life. The ability to ...
Stéphane H. Maes, T. V. Raman
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
13 years 11 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider