Sciweavers

1811 search results - page 316 / 363
» Facilitation, Systems, and Users: The Complete Socio-Technic...
Sort
View
NDSS
2007
IEEE
14 years 2 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
SIGITE
2004
ACM
14 years 1 months ago
The use of MUPPETS in an introductory java programming course
“The Multi-User Programming Pedagogy for Enhancing Traditional Study” (MUPPETS) system has been under development at RIT for the last three years. This multi-user environment ...
Kevin J. Bierre, Andrew M. Phelps
GIS
2009
ACM
14 years 18 days ago
Focus+Glue+Context: an improved fisheye approach for web map services
This paper proposes a method for generating a Focus+Glue +Context map for Web map services by improving existing fisheye views methods for cartographic data. While many studies h...
Daisuke Yamamoto, Shotaro Ozeki, Naohisa Takahashi
LISA
2003
13 years 9 months ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why it...
Deepak Giridharagopal
CGF
2008
151views more  CGF 2008»
13 years 8 months ago
Reconstructing head models from photographs for individualized 3D-audio processing
Visual fidelity and interactivity are the main goals in Computer Graphics research, but recently also audio is assuming an important role. Binaural rendering can provide extremely...
Matteo Dellepiane, Nico Pietroni, Tsingos Tsingos,...