Sciweavers

1647 search results - page 139 / 330
» Distributing private data in challenged network environments
Sort
View
HPDC
2010
IEEE
15 years 5 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
MM
2010
ACM
182views Multimedia» more  MM 2010»
15 years 4 months ago
A 3d data intensive tele-immersive grid
Networked virtual environments like Second Life enable distant people to meet for leisure as well as work. But users are represented through avatars controlled by keyboards and mo...
Benjamin Petit, Thomas Dupeux, Benoit Bossavit, Jo...
CANS
2009
Springer
169views Cryptology» more  CANS 2009»
15 years 10 months ago
Privacy-Preserving Relationship Path Discovery in Social Networks
As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites ov...
Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Pa...
SIGGRAPH
1997
ACM
15 years 8 months ago
Interactive simulation of fire in virtual building environments
This paper describes the integration of the Berkeley Architectural Walkthrough Program with the National Institute of Standards and Technology’s CFAST fire simulator. The integ...
Richard W. Bukowski, Carlo H. Séquin
WSC
1997
15 years 5 months ago
Why We Don't Know How To Simulate the Internet
Simulating how the global Internet data network behaves is an immensely challenging undertaking because of the network’s great heterogeneity and rapid change. The heterogeneity ...
Vern Paxson, Sally Floyd