Sciweavers

427 search results - page 49 / 86
» Policies: Giving Users Control over Calls
Sort
View
PRESENCE
2002
185views more  PRESENCE 2002»
13 years 9 months ago
EyeTap Devices for Augmented, Deliberately Diminished, or Otherwise Altered Visual Perception of Rigid Planar Patches of Real-Wo
Diminished reality is as important as augmented reality, and both are possible with a device called the Reality Mediator. Over the past two decades, we have designed, built, worn,...
Steve Mann, James Fung
IMC
2010
ACM
13 years 7 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
GRAPHICSINTERFACE
2000
13 years 11 months ago
Multi-resolution Amplification Widgets
We describe a 3D graphical interaction tool called an amplification widget that allows a user to control the position or orientation of an object at multiple scales. Fine and coar...
Kiril Vidimce, David C. Banks
CSE
2009
IEEE
14 years 4 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...