Sciweavers

2421 search results - page 421 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
123
Voted
ICMI
2005
Springer
164views Biometrics» more  ICMI 2005»
15 years 8 months ago
A user interface framework for multimodal VR interactions
This article presents a User Interface (UI) framework for multimodal interactions targeted at immersive virtual environments. Its configurable input and gesture processing compon...
Marc Erich Latoschik
149
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 5 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
130
Voted
ATAL
2007
Springer
15 years 8 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
173
Voted
ICCV
2007
IEEE
16 years 4 months ago
Real-Time Visibility-Based Fusion of Depth Maps
We present a viewpoint-based approach for the quick fusion of multiple stereo depth maps. Our method selects depth estimates for each pixel that minimize violations of visibility ...
Paul Merrell, Amir Akbarzadeh, Liang Wang, Philipp...
125
Voted
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 9 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King