Sciweavers

14347 search results - page 30 / 2870
» Interactive Granular Computing
Sort
View
UIST
1995
ACM
14 years 1 months ago
The World Through the Computer: Computer Augmented Interaction with Real World Environments
Current user interface techniques such as WIMP or the desktop metaphor do not support real world tasks, because the focus of these user interfaces is only on human–computer inte...
Jun Rekimoto, Katashi Nagao
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
IACR
2011
196views more  IACR 2011»
12 years 9 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
CGA
1998
13 years 9 months ago
Computer Vision for Interactive Computer Graphics
William T. Freeman, David B. Anderson, Paul A. Bea...
PERCOM
2004
ACM
14 years 9 months ago
Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer Interaction
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
D. Scott McCrickard, Christa M. Chewar