Sciweavers

10996 search results - page 2066 / 2200
» Future Directions in Computing
Sort
View
CCS
2008
ACM
13 years 11 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
CHI
2008
ACM
13 years 11 months ago
Do visualizations improve synchronous remote collaboration?
Information visualizations can improve collaborative problem solving, but this improvement may depend on whether visualizations promote communication. In an experiment on the effe...
Aruna D. Balakrishnan, Susan R. Fussell, Sara B. K...
CIKM
2008
Springer
13 years 11 months ago
Modeling hidden topics on document manifold
Topic modeling has been a key problem for document analysis. One of the canonical approaches for topic modeling is Probabilistic Latent Semantic Indexing, which maximizes the join...
Deng Cai, Qiaozhu Mei, Jiawei Han, Chengxiang Zhai
3DIM
2005
IEEE
13 years 11 months ago
Bayesian Modelling of Camera Calibration and Reconstruction
Camera calibration methods, whether implicit or explicit, are a critical part of most 3D vision systems. These methods involve estimation of a model for the camera that produced t...
Rashmi Sundareswara, Paul R. Schrater
ACMSE
2005
ACM
13 years 11 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
« Prev « First page 2066 / 2200 Last » Next »