Sciweavers

492 search results - page 94 / 99
» Encrypted Shared Data Spaces
Sort
View
PRESENCE
2006
102views more  PRESENCE 2006»
13 years 7 months ago
The Usability of Collaborative Virtual Environments and Methods for the Analysis of Interaction
This paper describes two methods for analyzing interactions in collaborative virtual environments (CVEs): one whereby quantitative data are captured, interaction is categorized in...
Ralph Schroeder, Ilona Heldal, Jolanda G. Tromp
ICRA
2009
IEEE
226views Robotics» more  ICRA 2009»
13 years 5 months ago
3D model selection from an internet database for robotic vision
Abstract-- We propose a new method for automatically accessing an internet database of 3D models that are searchable only by their user-annotated labels, for using them for vision ...
Ulrich Klank, Muhammad Zeeshan Zia, Michael Beetz
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 8 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...
IMC
2009
ACM
14 years 2 months ago
Sampling biases in network path measurements and what to do about it
We show that currently prevalent practices for network path measurements can produce inaccurate inferences because of sampling biases. The inferred mean path latency can be more t...
Srikanth Kandula, Ratul Mahajan
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 24 days ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich